Next Steps
You've completed the quickstart and have your environment set up. Now choose your learning path based on your goals and use case.
Choose Your Path
🚀 I want to integrate AnkaSecure into my application
You'll need: - Deep understanding of SDK or REST API - Algorithm selection guidance - Error handling patterns
Start here: 1. SDK Integration Guide - Complete Java SDK documentation 2. 28 Integration Flows - Real-world code examples 3. API Reference - Complete REST API documentation 4. Error Handling - Production error patterns
🔐 I need to understand security & compliance
You'll need: - Security controls documentation - Compliance frameworks alignment - Regulatory requirements mapping
Start here: 1. Security Overview - OWASP 100% compliance 2. Standards Alignment - NIST, FIPS, BSI compliance 3. Regulatory Frameworks - HIPAA, PCI-DSS, GDPR 4. Algorithm Security Levels - NIST security levels
⚡ I want to choose the right algorithm for my use case
You'll need: - Algorithm capabilities comparison - Performance benchmarks - Security vs speed trade-offs
Start here: 1. Algorithm Catalog - 78 algorithms with recommendations 2. Algorithm Selection Guide - Decision tree 3. Performance Benchmarks - Throughput & latency data 4. Hybrid Cryptography - Classical + PQC combined
📦 I'm migrating from classical cryptography to PQC
You'll need: - Migration strategies - Step-by-step runbooks - Rollback procedures
Start here: 1. RSA → ML-KEM Migration - Encryption migration 2. RSA → ML-DSA Migration - Signature migration 3. PKCS#7 → JOSE Conversion - Format conversion 4. Migration Planning Guide - Timeline & strategies
🏥 I need industry-specific compliance guidance
Healthcare, Finance, Government, Telecom
Start here: 1. Healthcare (HIPAA) - PHI protection with PQC 2. Financial Services (PCI-DSS) - Payment data encryption 3. Government (FedRAMP) - Federal compliance 4. Telecommunications - Network security
🤖 I want to automate with CLI or scripts
You'll need: - CLI command reference - Scripting examples - CI/CD integration patterns
Start here: 1. CLI Commands Reference - Full syntax for 25 commands 2. Scripting Examples - Bash/PowerShell automation 3. CI/CD Integration - Jenkins, GitLab, GitHub Actions 4. CLI Troubleshooting - Common CLI issues
🔧 I'm debugging errors or performance issues
You'll need: - Error resolution workflows - Performance optimization tips - Troubleshooting guides
Start here: 1. Common Errors - FAQ-style troubleshooting 2. API Errors - REST API error resolution 3. Error Code Catalog - Complete error reference (27 codes) 4. Performance Guide - SDK optimization patterns
🎓 I want to learn more about post-quantum cryptography
You'll need: - PQC fundamentals - Algorithm background - Threat landscape
Start here: 1. What is PQC? - Post-quantum cryptography explained 2. Why PQC Matters - Quantum threat timeline 3. About AnkaSecure - Platform overview 4. Glossary - PQC terminology reference
Common Learning Paths
Path 1: Java Developer Onboarding (2-3 hours)
✅ Quickstart (10 min)
↓
1. SDK Overview (15 min)
↓
2. Integration Flow 1: Asymmetric Encrypt/Decrypt (30 min)
↓
3. Integration Flow 5: ML-KEM Compact Operations (30 min)
↓
4. Algorithm Selection Guide (20 min)
↓
5. Testing Guide (30 min)
↓
✅ Ready to integrate!
Path 2: Security Architect Review (1-2 hours)
✅ Quickstart (10 min)
↓
1. Security Overview (20 min)
↓
2. OWASP Compliance Details (30 min)
↓
3. Standards Alignment (NIST, FIPS) (20 min)
↓
4. Algorithm Catalog (30 min)
↓
5. Performance Benchmarks (20 min)
↓
✅ Ready to evaluate!
Path 3: DevOps/SRE Deployment (1-2 hours)
✅ Quickstart (10 min)
↓
1. CLI Installation (10 min)
↓
2. CLI Commands Reference (30 min)
↓
3. Scripting Examples (30 min)
↓
4. Error Handling (20 min)
↓
5. Troubleshooting Guide (20 min)
↓
✅ Ready to automate!
Path 4: Compliance Officer Due Diligence (30-45 min)
✅ Platform Overview (10 min)
↓
1. Security & Compliance Overview (10 min)
↓
2. Regulatory Frameworks (HIPAA, PCI-DSS) (15 min)
↓
3. Standards Alignment (NIST, FIPS, BSI) (10 min)
↓
4. Industry-Specific Use Case (15 min)
↓
✅ Ready to certify!
Resource Index by Topic
Cryptographic Operations
| Topic | Resource |
|---|---|
| Key Generation | API Reference |
| Encryption/Decryption | Secure Operations |
| Digital Signatures | Secure Operations |
| Streaming (Large Files) | Secure Streaming |
| Key Rotation | Key Lifecycle |
Integration Methods
| Method | Resource |
|---|---|
| Java SDK | SDK Overview |
| CLI Tools | CLI Overview |
| REST API | API Reference |
| Postman Collection | Downloads |
Algorithms
| Family | Resource |
|---|---|
| ML-KEM (Kyber) | Algorithm Catalog |
| ML-DSA (Dilithium) | Algorithm Catalog |
| SLH-DSA (SPHINCS+) | Algorithm Catalog |
| Classical (RSA, AES) | Algorithm Catalog |
| Performance Data | Benchmarks |
Use Cases
| Industry/Function | Resource |
|---|---|
| Healthcare | HIPAA Compliance |
| Finance | PCI-DSS Compliance |
| Government | FedRAMP Compliance |
| Migration | RSA → ML-KEM |
| Large Files | Streaming Operations |
Troubleshooting
| Issue Type | Resource |
|---|---|
| General Errors | Common Errors |
| API Errors | API Error Resolution |
| Error Codes | Error Catalog |
| SDK Issues | SDK Troubleshooting |
| CLI Issues | CLI Troubleshooting |
Stay Updated
- Documentation Search: Use the search bar for quick lookups
- Downloads: Get the latest SDK and CLI versions
- Support: Contact info@ankatech.co for assistance
Documentation Version: 3.0.0 Last Updated: 2025-12-26