This example demonstrates how a Java program can derive a key from from either a symmetric or asymmetric key using several different derivation methods.