A cryptographic module for embedded security across devices and in constrained environments.

 

Security Builder Crypto-C

Security Builder Crypto-J

Programming Language C Java
Symmetric Encryption Algorithms AES, DES, 3DES, RC2, RC4, RC5* AES, DES, 3DES, RC2, RC4, RC5**
Asymmetric Encryption
Algorithms
RSA, ECIES RSA, ECIES
Key Agreement/Key Transport DH, ECDH, ECMQV, RSA DH, ECDH, ECMQV, RSA
Digital Signatures ECDSA, ECQV, RSA, DSA, RSA-PSS, ECNR ECDSA, RSA, DSA
Hash Functions SHA-1, SHA-224, SHA-256, SHA-384,
SHA-512, MD2, MD4, MD5, HMAC-SHA-1, 
HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, 
HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1
SHA-1, SHA-224, SHA-256, SHA-384,
SHA-512, MD2, MD5, HMAC-SHA-1,
HMAC-SHA-224, HMAC-SHA-256,
HMAC-SHA-384, HMAC-SHA-512,
HMAC-MD5, ANSI KDF, IEEE KDF1
Random Number Generation ANSI X9.62 RNG, FIPS 140-2, Hash_DRBG,
HMAC_DRBG, CTR_DRBG
ANSI X9.62 RNG, FIPS140-2, Hash_DRBG,
HMAC_DRBG, CTR_DRBG
Implementation Code Size Range 2 KB-175 KB 300 KB
Supported Platforms

Over 30 platforms** including:
Android
AIX
ARM
FreeBSD
Greenhills INTEGRITY
Red Hat and Suse Linux (x86, ARM,
iOS
Itanium, Opteron, Xeon)
Macintosh OS X
Novell Netware
QNX
Wind River VxWorks
Windows (x86, Opteron, Xeon, Itanium)
Windows Mobile

JDK 1.3, 1.4, 1.5, 1.6

 

*RC5 available to customers outside the United States only