Implementing Cryptographic Methods