the possibility of creating functional models of all currently used symmetric and asymmetric cryptography ciphers,
the possibility of analyzing data generated by cryptographic algorithm models using algebraic and statistical methods,
extensive models of cryptographic protocols implemented in line with valid standards,
models of secure communication systems operating in the real Internet environment,
programming language with a number of operators and functions allowing to effectively process extensive data structures and arbitrarily large and precise numbers.