This coprocessor provides fast calculations for many public key-based algorithms, including RSA, El-Gamal/DSA, Diffie-Hellman, and Elliptic curve. Note that the cryptographic operations performed by the BluStor card, including symmetric and asymmetric encryption / decryption, digital signature generation / verification, and random number generation, are carried out to support a security application at the application level, independent of the cryptographic operations performed by the Bluetooth component as it wirelessly transmits the data. That is, the BluStor card provides comprehensive end-to-end protection for applications, in addition to the link-to-link protections provided by the Bluetooth communication protocol. In the event security of Bluetooth is compromised, the security of transmitted data or stored data of an application is still preserved by the BluStor card.