Cross-platform Cryptographic Module
Security Builder® Crypto™ is highly portable and size-optimized cryptographic library which includes a range of current and legacy algorithms that provide proven cryptographic security to both server side and resource-constrained devices and applications. Security Builder Crypto has helped secure hundreds of millions of fielded devices.
Security Builder® Crypto™* acts as a software cryptographic provider within the Certicom Security Architecture™ – a comprehensive, modular and portable solution designed to allow developers to quickly and cost-effectively embed security across multiple families and generations of devices.
Security Builder® Crypto™ is highly flexible and can work in a wide range of applications and devices, such as:
- Chip manufacturers who want to optimize cryptographic routines and improve security performance
- Device manufacturers who want to embed secure cryptographic functionality into their end products
- Application developers who want to create a cryptographic module that handles all encryption, and decryption, digital signatures, and message authentication codes
A cryptographic module for embedded security across devices and in constrained environments.
|Security Builder Crypto-C||Security Builder Crypto-J|
|Symmetric Encryption Algorithms||AES, DES, 3DES, RC2, RC4||AES, DES, 3DES, RC2, RC4|
|Asymmetric Encryption Algorithms||RSA, ECIES||RSA, ECIES|
|Key Agreement/Key Transport||DH, ECDH, ECMQV, RSA||DH, ECDH, ECMQV, RSA|
|Digital Signatures||ECDSA, ECQV, RSA, DSA, RSA-PSS||ECDSA, RSA, DSA, RSA-PSS|
|Hash Functions||SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD4, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1, SHA-3||SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1|
|Random Number Generation||ANSI X9.62 RNG, FIPS 140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG||ANSI X9.62 RNG, FIPS140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG|
|Supported Platforms||QNX, Linux, Windows, iOS & various RTOSs on ARM & x86 CPU architectures||JDK 1.6, 17, 1.8 & Android|
Compact and Efficient Crypto Implementations
Smaller and Faster
The full cryptographic suite of algorithms within Security Builder® Crypto™ is optimized for constrained platforms but can also be used in desktops and servers. The option to link only the features you need means compact implementations with incremental modules from 2KB in size. The result is faster processing, better bandwidth usage, reduced storage and longer battery life.
The long-term interoperability of your security design is assured through compliance with ANSI, IEEE and FIPS standards, as well as NIST requirements, and a wide range of algorithms including ECC, RSA, DSA, Diffie-Hellman, SHA-2, SHA-3, and AES. These algorithms provide the necessary security for SSL/TLS, IKEv1/IKEv2, IPSec, and other security protocols. In addition, Security Builder® Crypto™ has a modular architecture which can also be extended to support dedicated hardware crypto engines and keystores.
Certicom also supports integration with the OpenSSL Engine for customers wishing to leverage open source applications.
Security Builder Crypto can be easily integrated into your applications with minimal porting required to support multiple platforms, cutting development costs and time-to-market. Used within the context of the Certicom Security Architecture, the Security Builder API provides a common interface between the protocols and cryptographic providers, further simplifying your development cycle.
As the Advanced Encryption Standard (AES) replaces older security algorithms, public-key sizes must be increased to provide equivalent strength for AES. ECC provides smaller key sizes with higher strength-per-bit than any public-key cryptographic system today, resulting in better performance in constrained environments.
Certicom libraries also support native AES acceleration offered by modern microprocessors to boost cryptographic performance.