This example demonstrates how to use a Utimaco HSM as a token to generate a key and use that key to perform encryption.