Plug-ins are called to verify, encrypt, and decrypt keys.
Key validation, encryption, and decryption requests are required.