The example below shows two simple crypto operations that are exposed via a web service interface. The approach is top-down,...