End-to-end security is available for both client and server-side platforms with Security Builder® GSE™. All components operate in FIPS-approved mode unless stated otherwise.

  Security Builder GSE-C 1.x Security BuilderGSE-C 2.x Security Builder GSE-J 2.x
Programming Language C C Java
FIPS 140-2 Validation Windows 98. Windows CE - Certificate #316, Palm - Certificate #351 Certificate # 542 Certificate # 578
FIPS Approved Algorithms DES, FIPS 46-3, NIST Certificate #160, 3DES, FIPS 46-3, NIST Certificate #100, AES, FIPS 197, NIST Certificate #5 AES, DES, 3DES, DSS, DSA, ECDSA, HMAC, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, RSA PKCS #1 v1.5, RNG, SHA-1, SHA-256, SHA-384, SHA-512

For certificate #s, visit http://csrc.nist.gov/cryptval/
AES, DES, 3DES, DSA, ECDSA, HMAC, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, RSA PKCS#1 v1.5, RNG, SHA-1, SHA-256, SHA-384, SHA-512

For certificate #s, visit http://csrc.nist.gov/cryptval/
Symmetric Encryption Algorithms AES, DES, 3DES AES, DES, 3DES AES, DES, 3DES
Key Agreement/Key Transport NA DH, ECDH, ECMQV, RSA

* All these techniques may be used by a cryptographic module in an approved mode of operation
DH, ECDH, ECMQV, RSA

(All these techniques may be used by a cryptographic module in an approved mode of operation)
Digital Signatures RSA PKCS #1 v1.5 (Windows platforms only) RSA PKCS #1 v1.5, ECDSA RSA PKCS #1 v1.5, ECDSA
Hash Functions SHA-1, HMAC SHA-1 HMAC, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512,SHA-1, SHA-256, SHA-384, SHA-512 HMAC, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, SHA-1, SHA-256, SHA-384, SHA-512
Additional Algorithm Support (non-FIPS approved mode of operation) DSA, ECDSA,RSA PKCS #1, HMAC-SHA-1, RC2, RC4, DH, ECDH, ECMQV,MD2, MD5, HMAC-SHA-1, HMAC-MD5, ANSI KDF, IEEE KDF1 RC2, RC4, MD2, MD4, MD5, HMAC-MD5, ARC2, ARC4, DESX, RSA PKCS #1 v1.5 (Encryption), RSA PKCS #1 v2 (Encryption) RC2, RC4, MD2, MD4, MD5, HMAC-MD5, ARC2, ARC4, DESX, RSA PKCS#1 v1.5, (Encryption), RSA PKCS#1 v2 (Encryption)
Random Number Generation ANSI X9.62, FIPS140-2 extension ANSI X9.62, FIPS140-2 extension ANSI X9.62, FIPS 140-2 extension
Implementation Code Size Range  Palm: 50 KB
Windows CE: 115 KB
Windows 98: 136 KB
1 MB-4MB 385 KB
Supported Platforms Palm OS 3.5 and compatible operating systems

Windows Mobile and compatible operating systems

Windows 98 and compatible operating systems
AIX 5.2 (32-bit/64-bit Power PC) and compatible operating systems

HP-UX 11.00 (32-bit/64-bit RISC) and compatible operating systems

HP-UX 11i Itanium (64-bit) and compatible operating systems

Red Hat Linux AS 3.0 (x86/Itanium) (64-bit) and compatible operating systems

Sun Solaris 2.9 (32-bit/64-bit SPARC) and compatible operating systems

Symbian 9

Windows 2003 (32-bit) and compatible operating systems

Windows 2003 Itanium (64-bit) and compatible operating systems
JDK 1.3, 1.4

*Availability of Security Builder GSE-J 2.x
1. Security Builder GSE-J 2.x shipped on its own
2. Security Builder GSE-J 2.x integrated and shipped with Security Builder SSL-J 4.x
3. Security Builder GSE-J 2.x integrated and shipped with Security Builder PKI-J 3.x

**RC5 is only available to customers outside of the United States