BlackBerry Certicom

Security Builder® Crypto™

Cross-platform Cryptographic Module

Security Builder® Crypto™ is highly portable and size-optimized cryptographic library which includes a range of current and legacy algorithms that provide proven cryptographic security to both server side and resource-constrained devices and applications. Security Builder Crypto has helped secure hundreds of millions of fielded devices.

Security Builder® Crypto™* acts as a software cryptographic provider within the Certicom Security Architecture™ – a comprehensive, modular and portable solution designed to allow developers to quickly and cost-effectively embed security across multiple families and generations of devices.

Security Builder® Crypto™ is highly flexible and can work in a wide range of applications and devices, such as:

  • Chip manufacturers who want to optimize cryptographic routines and improve security performance
  • Device manufacturers who want to embed secure cryptographic functionality into their end products
  • Application developers who want to create a cryptographic module that handles all encryption, and decryption, digital signatures, and message authentication codes



A cryptographic module for embedded security across devices and in constrained environments.

Security Builder Crypto-C Security Builder Crypto-J
Programming Language C Java
Symmetric Encryption Algorithms AES, DES, 3DES, RC2, RC4 AES, DES, 3DES, RC2, RC4
Asymmetric Encryption Algorithms RSA, ECIES RSA, ECIES
Key Agreement/Key Transport DH, ECDH, ECMQV, RSA DH, ECDH, ECMQV, RSA
Hash Functions SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD4, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1, SHA-3 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD2, MD5, HMAC-SHA-1, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, HMAC-MD5, ANSI KDF, IEEE KDF1
Random Number Generation ANSI X9.62 RNG, FIPS 140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG ANSI X9.62 RNG, FIPS140-2, Hash_DRBG, HMAC_DRBG, CTR_DRBG
Supported Platforms QNX, Linux, Windows, iOS & various RTOSs on ARM & x86 CPU architectures JDK 1.6, 17, 1.8 & Android


Compact and Efficient Crypto Implementations

Smaller and Faster

The full cryptographic suite of algorithms within Security Builder® Crypto™ is optimized for constrained platforms but can also be used in desktops and servers. The option to link only the features you need means compact implementations with incremental modules from 2KB in size. The result is faster processing, better bandwidth usage, reduced storage and longer battery life.

Comprehensive Security

The long-term interoperability of your security design is assured through compliance with ANSI, IEEE and FIPS standards, as well as NIST requirements, and a wide range of algorithms including ECC, RSA, DSA, Diffie-Hellman, SHA-2, SHA-3, and AES. These algorithms provide the necessary security for SSL/TLS, IKEv1/IKEv2, IPSec, and other security protocols. In addition, Security Builder® Crypto™ has a modular architecture which can also be extended to support dedicated hardware crypto engines and keystores.

Certicom also supports integration with the OpenSSL Engine for customers wishing to leverage open source applications.

Improved ROI

Security Builder Crypto can be easily integrated into your applications with minimal porting required to support multiple platforms, cutting development costs and time-to-market. Used within the context of the Certicom Security Architecture, the Security Builder API provides a common interface between the protocols and cryptographic providers, further simplifying your development cycle.

Better Performance

As the Advanced Encryption Standard (AES) replaces older security algorithms, public-key sizes must be increased to provide equivalent strength for AES. ECC provides smaller key sizes with higher strength-per-bit than any public-key cryptographic system today, resulting in better performance in constrained environments.

Certicom libraries also support native AES acceleration offered by modern microprocessors to boost cryptographic performance.