A cryptographic module for embedded security across devices and in constrained environments.
Security Builder Crypto-C |
Security Builder Crypto-J |
|
---|---|---|
Programming Language | C | Java |
Symmetric Encryption Algorithms | AES, DES, 3DES, RC2, RC4, RC5* | AES, DES, 3DES, RC2, RC4, RC5** |
Asymmetric Encryption Algorithms |
RSA, ECIES | RSA, ECIES |
Key Agreement/Key Transport | DH, ECDH, ECMQV, RSA | DH, ECDH, ECMQV, RSA |
Digital Signatures | ECDSA, ECQV, RSA, DSA, RSA-PSS, ECNR | ECDSA, RSA, DSA |
Hash Functions | SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD4, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1 |
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1 |
Random Number Generation | ANSI X9.62 RNG, FIPS 140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG |
ANSI X9.62 RNG, FIPS140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG |
Implementation Code Size Range | 2 KB-175 KB | 300 KB |
Supported Platforms | Over 30 platforms** including: |
JDK 1.3, 1.4, 1.5, 1.6
|
*RC5 available to customers outside the United States only |