Comparison of cryptography libraries
The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls to each of the supported features.
Cryptography libraries
[edit]Name of implementation | Initiative | Main implementation language | Open-source software | Software license | Latest release | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Jack Lloyd | C | Yes | Simplified BSD | 3.5.0 (July 8, 2024[1]) [±] | ||||||||||
Bouncy Castle | Legion of the Bouncy Castle Inc. | Java, C# | Yes | MIT License |
| ||||||||||
BSAFE | Dell, formerly RSA Security | Java, C, Assembly | No | Proprietary | Crypto-C Micro Edition: 4.1.5 (December 17, 2020[7]) [±]
| ||||||||||
cryptlib | Peter Gutmann | C | Yes | Sleepycat License or commercial license | 3.4.5 (2019[12]) [±] | ||||||||||
Crypto | The Crypto project | C | Yes | Boost (all individual files are public domain) | Jan 10, 2023 (8.9.0) | ||||||||||
GnuTLS | Nikos Mavrogiannopoulos, Simon Josefsson | C | Yes | LGPL-2.1-or-later | 3.8.5[13] 2024-04-04 | ||||||||||
Java's default JCA/JCE providers | Oracle | Java | Yes | GNU GPL v2 and commercial license |
23.0.1 (October 15, 2024[14]) [±] | ||||||||||
LibreSSL | OpenBSD Foundation | C | Yes | Apache 1.0 | 4.0.0[19] 2024-10-14 | ||||||||||
Libgcrypt | GnuPG community and g10code | C | Yes | GNU LGPL v2.1 |
| ||||||||||
libsodium | Frank Denis | C | Yes | ISC | Sep 13, 2023 (1.0.19) | ||||||||||
Mbed TLS | Arm Limited | C | Yes | Apache 2.0 | 3.0.0 (July 7, 2021[22]) [±] ) | ||||||||||
NaCl | Daniel J. Bernstein, Tanja Lange, Peter Schwabe | C | Yes | Public domain | February 21, 2011[23] | ||||||||||
Nettle | C | Yes | GNU GPL v2 or GNU LGPL v3 |
3.10[24] 2024-06-16 | |||||||||||
Network Security Services (NSS) | Mozilla | C | Yes | MPL 2.0 |
| ||||||||||
OpenSSL | The OpenSSL Project | C | Yes | Apache 2.0 | 3.4.0[26] 2024-10-22 | ||||||||||
wolfCrypt | wolfSSL, Inc. | C | Yes | GNU GPL v2 or commercial license | 5.6.4 (October 30, 2023[27]) [±] |
FIPS 140
[edit]This table denotes, if a cryptography library provides the technical requisites for FIPS 140, and the status of their FIPS 140 certification (according to NIST's CMVP search, modules in process list and implementation under test list).
Implementation | FIPS 140-2 mode | FIPS 140-2 validated | FIPS 140-3 validated |
---|---|---|---|
Botan | No | No | No |
Bouncy Castle | Yes | Yes[28] | In process[29] |
BSAFE | Yes | Yes[30][31] | In process[29] |
cryptlib | Yes | No | No |
Crypto | No | No[a] | No |
GnuTLS | No | Yes[32][b] | In process[33] |
Java's default JCA/JCE providers | No | No[34][c] | No |
Libgcrypt | Yes | Yes[35][d] | In process[33] |
libsodium | No | No | No |
Mbed TLS | No | No | No |
NaCl | No | No | No |
Nettle | No | No | No |
Network Security Services (NSS) | Yes | Yes[36][e] | In process[33] |
OpenSSL | Yes | Yes[37][f] | In process[33] |
wolfCrypt | Yes | Yes[38] | In process[29] |
- ^ Crypto received three FIPS 140 validations from 2003 through 2008. In 2016 NIST moved Crypto to the Historical Validation List.
- ^ While GnuTLS is not FIPS 140-2 validated by GnuTLS.org, validations exist for versions from Amazon Web Services Inc., Oracle Corporation, Red Hat Inc. and SUSE LLC.
- ^ While none of default JDK JCA/JCE providers is FIPS 140-2 validated, there are other JCE/JCA third party providers which are FIPS 140-2 validated.
- ^ While Libgcrypt is not FIPS 140-2 validated by g10code, validations exist for versions from Amazon Web Services Inc., Canonical Ltd., Oracle Corporation, Red Hat Inc. and SUSE LLC.
- ^ While the Network Security Services (NSS) are not FIPS 140-2 validated by the Mozilla Foundation, validations exist for versions from Amazon Web Services Inc., Canonical Ltd., Cisco Systems Inc., Hewlett Packard Enterprise, Oracle Corporation, Red Hat Inc., SafeLogic Inc., SUSE LLC and Trend Micro Inc.
- ^ While OpenSSL is not FIPS 140-2 validated by OpenSSL.org, validations exist for versions from Amazon Web Services Inc., Aqua Security Software Ltd., Broadcom Inc., Canonical Ltd., Cisco Systems Inc., Cohesity Inc., ControlUp Technologies Inc., Crestron Electronics Inc., Dell Inc., Gallagher Group, Hewlett Packard Enterprise, IBM Corporation, ICU Medical Inc., Intelligent Waves, Ixia, KeyPair Consulting Inc., Koninklijke Philips N.V., Lenovo Group Limited, LG Electronics Inc., LogRhythm, McAfee LLC, Metaswitch Networks Ltd, NetBrain Technologies Inc., Nutanix Inc., Onclave Networks Inc., Oracle Corporation, REDCOM Laboratories Inc., Red Hat Inc., SafeLogic Inc., Super Micro Computer Inc., SUSE LLC, Tanium Inc., Trend Micro Inc., Unisys Corporation, Verizon, VMware Inc. and Wickr Inc.
Key operations
[edit]Key operations include key generation algorithms, key exchange agreements, and public key cryptography standards.
Public key algorithms
[edit]Implementation | RSA | DSA | ECDSA | EdDSA | Ed448 | DH | ECDH | ECIES | ElGamal | NTRU (IEEE P1363.1) |
DSS |
---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
BSAFE | Yes | Yes | Yes | No | No | Yes | Yes | Yes | No | No | No |
cryptlib | Yes | Yes | Yes | No | No | Yes | Yes | No | Yes | No | Yes |
Crypto | Yes | Yes | Yes | No | No | Yes | Yes | Yes | Yes | No | Yes |
GnuTLS | Yes | No | No | No | No | No | No | No | No | No | No |
Java's default JCA/JCE providers | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes |
Libgcrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes[a] | No | Yes | No | Yes |
libsodium | No | No | No | Yes | No | No | No | No | No | No | No |
Mbed TLS | Yes | Yes | Yes | No | No | Yes | Yes | No | No | No | No |
Nettle | Yes | Yes | No | Yes | No | No | No | No | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No | No |
wolfCrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes |
- ^ By using the lower level interface.
Elliptic-curve cryptography (ECC) support
[edit]Implementation | NIST | SECG | ECC Brainpool | Curve25519 | Curve448 | GOST R 34.10[39] | SM2 |
---|---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | No | Yes | No |
BSAFE | Yes | Yes | No | No | No | No | No |
cryptlib | Yes | Yes | Yes | No | No | No | No |
Crypto | Yes | Yes | Yes | Yes | No | No | No |
GnuTLS | Yes | No | No | No | No | No | No |
Java's default JCA/JCE providers | Yes | Yes | No | Yes | Yes | No | No |
Libgcrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
libsodium | Yes | No | No | Yes | Yes | No | No |
Mbed TLS | Yes | Yes | Yes | Yes | No | No | No |
Nettle | Yes | Partial | No | Yes | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
wolfCrypt | Yes | Yes | Yes | Yes | Yes | No | No |
Public key cryptography standards
[edit]Implementation | PKCS #1 | PKCS #5,[40] PBKDF2 | PKCS #8 | PKCS #12 | IEEE P1363 | ASN.1 |
---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | No | Yes | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | Yes | Yes |
BSAFE Crypto-J | Yes | Yes | Yes | Yes | No | Yes |
cryptlib | Yes | Yes | Yes | Yes | No | Yes |
Crypto | Yes | Yes | Yes[a] | No | Yes | Yes |
GnuTLS | ||||||
Java's default JCA/JCE providers | Yes | Yes | Yes | Yes | Yes | Yes |
Libgcrypt | Yes | Yes[b] | Yes[b] | Yes[b] | Yes[b] | Yes[b] |
libsodium | No | No | No | No | No | No |
Mbed TLS | Yes | No | Yes | Yes | No | Yes |
Nettle | Yes | Yes | No | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | No | Yes |
wolfCrypt | Yes | Yes | Yes | Yes | No | Yes |
- ^ The library offers X.509 and PKCS #8 encoding without PEM by default. For PEM encoding of public and private keys the PEM Pack is needed.
- ^ a b c d e These Public Key Cryptographic Standards (PKCS) are supported by accompanying libraries and tools, which are also part of the GnuPG framework, although not by the actual libgcrypt library.
Hash functions
[edit]Comparison of supported cryptographic hash functions. Here hash functions are defined as taking an arbitrary length message and producing a fixed size output that is virtually impossible to use for recreating the original message.
Implementation | MD5 | SHA-1 | SHA-2 | SHA-3 | RIPEMD-160 | Tiger | Whirlpool | BLAKE2 | GOST R 34.11-94[41] (aka GOST 34.311-95) |
GOST R 34.11-2012 (Stribog)[42] |
SM3 |
---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
BSAFE Crypto-J | Yes | Yes | Yes | Yes | Yes | No | No | No | No | No | No |
cryptlib | Yes | Yes | Yes | Yes | Yes | No | Yes | No | No | No | No |
Crypto | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
GnuTLS | |||||||||||
Java's default JCA/JCE providers | Yes | Yes | Yes | Yes | No | No | No | No | No | No | No |
Libgcrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
libsodium | No | No | Yes | No | No | No | No | Yes | No | No | No |
Mbed TLS | Yes | Yes | Yes | Yes | Yes | No | No | No | No | No | No |
Nettle | Yes | Yes | Yes | Yes | Yes | No | No | No | Yes | No | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
wolfCrypt | Yes | Yes | Yes | Yes | Yes | No | No | Yes | No | No | No |
MAC algorithms
[edit]Comparison of implementations of message authentication code (MAC) algorithms. A MAC is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed in transit (its integrity).
Implementation | HMAC-MD5 | HMAC-SHA1 | HMAC-SHA2 | Poly1305 | BLAKE2-MAC |
---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | Yes |
BSAFE Crypto-J | Yes | Yes | Yes | Yes | No |
cryptlib | Yes | Yes | Yes | No | No |
Crypto | Yes | Yes | Yes | Yes | Yes |
GnuTLS | |||||
Java's default JCA/JCE providers | Yes | Yes | Yes | No | No |
Libgcrypt | Yes | Yes | Yes | Yes | Yes |
libsodium | No | No | Yes | Yes | Yes |
Mbed TLS | Yes | Yes | Yes | No | No |
Nettle | Yes | Yes | Yes | Yes | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes |
wolfCrypt | Yes | Yes | Yes | Yes | Yes |
Block ciphers
[edit]Table compares implementations of block ciphers. Block ciphers are defined as being deterministic and operating on a set number of bits (termed a block) using a symmetric key. Each block cipher can be broken up into the possible key sizes and block cipher modes it can be run with.
Block cipher algorithms
[edit]Implementation | AES | 3DES | Camellia | Blowfish | Twofish | IDEA | CAST5 | ARIA | GOST 28147-89[43] / GOST R 34.12-2015 (Magma[44] & Kuznyechik[45]) |
SM4 |
---|---|---|---|---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Bouncy Castle[46] | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
BSAFE Crypto-J | Yes | Yes | No | No | No | No | No | No | No | No |
cryptlib[47] | Yes | Yes | No | Yes | No | Yes | Yes | No | No | No |
Crypto | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Partial[a] | Yes |
GnuTLS | Yes | No | Yes | No | No | No | No | No | No | No |
Java's default JCA/JCE providers | Yes | Yes | No | Yes | No | No | No | No | No | No |
Libgcrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
libsodium | Partial[b] | No | No | No | No | No | No | No | No | No |
Mbed TLS | Yes | Yes | Yes | Yes | No | No | No | No | No | No |
Nettle | Yes | Yes | Yes | Yes | No | No | No | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes |
wolfCrypt | Yes | Yes | Yes | No | No | Yes | No | No | No | No |
Cipher modes
[edit]Implementation | ECB | CBC | OFB | CFB | CTR | CCM | GCM | OCB | XTS | AES-Wrap | Stream | EAX |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Botan | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Bouncy Castle | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes |
BSAFE | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | No |
cryptlib | Yes | Yes | Yes | Yes | No | No | Yes | No | No | No | No | No |
Crypto | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
GnuTLS | ||||||||||||
Java's default JCA/JCE providers | Yes | Yes | Yes | Yes | Yes | No | Yes | No | No | Yes | Yes | No |
Libgcrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
libsodium | No | No | No | No | Yes | No | Yes | No | No | No | No | No |
Mbed TLS | Yes | Yes | No | Yes | Yes | Yes | Yes | No | No | No | No | No |
Nettle | Yes | Yes | No | No | Yes | Yes | Yes | No | No | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
wolfCrypt | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | No |
Stream ciphers
[edit]The table below shows the support of various stream ciphers. Stream ciphers are defined as using plain text digits that are combined with a pseudorandom cipher digit stream. Stream ciphers are typically faster than block ciphers and may have lower hardware complexity, but may be more susceptible to attacks.
Implementation | RC4 | HC-256 | Rabbit | Salsa20 | ChaCha | SEAL | Panama | WAKE | Grain | VMPC | ISAAC |
---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Yes | No | No | Yes | Yes | No | No | No | No | No | No |
Bouncy Castle | Yes | Yes | No | Yes | Yes | No | No | No | Yes | Yes | Yes |
BSAFE Crypto-J | Yes | No | No | No | Yes | No | No | No | No | No | No |
cryptlib | Yes | No | No | No | No | No | No | No | No | No | No |
Crypto | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | No | No |
GnuTLS | |||||||||||
Java's default JCA/JCE providers | Yes | No | No | No | Yes | No | No | No | No | No | No |
Libgcrypt | Yes | No | No | Yes | Yes | No | No | No | No | No | No |
libsodium | No | No | No | Yes | Yes | No | No | No | No | No | No |
Mbed TLS | Yes | No | No | No | Yes | No | No | No | No | No | No |
Nettle | Yes | No | No | Yes | Yes | No | No | No | No | No | No |
OpenSSL | Yes | No | No | No | Yes | No | No | No | No | No | No |
wolfCrypt | Yes | Yes | Yes | Yes | Yes | No | No | No | No | No | No |
Hardware-assisted support
[edit]These tables compare the ability to use hardware enhanced cryptography. By using the assistance of specific hardware, the library can achieve greater speeds and/or improved security than otherwise.
Smart card, SIM, HSM protocol support
[edit]Implementation | PKCS #11 | PC/SC | CCID |
---|---|---|---|
Botan | Yes | No | No |
Bouncy Castle | Yes[a] | No | No |
BSAFE | Yes[b] | No | No |
cryptlib | Yes | No | No |
Crypto | No | No | No |
GnuTLS | Yes | No | No |
Java's default JCA/JCE providers | Yes | No[c] | No[c] |
Libgcrypt | Yes[48] | Yes[49] | Yes[49] |
libsodium | No | No | No |
Mbed TLS | Yes[50] | No | No |
OpenSSL | Yes[50] | No | No |
wolfCrypt | Yes | No | No |
General purpose CPU, platform acceleration support
[edit]Implementation | AES-NI | SSSE3, SSE4.1 | AVX, AVX2 | AVX-512 | RDRAND | VIA PadLock | Intel QuickAssist | ARMv7-A NEON | ARMv8-A cryptography instructions | Power ISA v2.03 (AltiVec[a]) | Power ISA v2.07 (e.g., POWER8 and later[a]) |
---|---|---|---|---|---|---|---|---|---|---|---|
Botan | Yes | Yes | Yes | Yes | Yes | No | No | Yes | Yes | Yes | Yes |
BSAFE | Yes[b] | Yes[b] | Yes[b] | No | Yes[b] | No | No | No | Yes[b] | No | No |
cryptlib | Yes | Yes | Yes | No | Yes | Yes | No | No | No | No | No |
Crypto | Yes | Yes | Yes | No | Yes | Yes[c] | No | Yes | Yes | Yes | Yes |
GnuTLS | Yes | No | No | No | No | Yes | No | No | No | No | No |
Java's default JCA/JCE providers | Yes[d] | Yes[d] | Yes[d] | Yes[d] | Yes[d] | No | No | No | Yes[d] | No | Yes[d] |
Libgcrypt[51] | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | No | Yes |
libsodium | Yes | Yes | Yes | No | No | No | No | No | No | No | No |
OpenSSL | Yes | Yes | Yes | Yes | Yes[e] | Yes | No | Yes | Yes | Yes | Yes |
wolfCrypt | Yes | Yes | Yes | No | Yes | No | Yes[52] | Yes | Yes[53] | No | No |
- ^ a b AltiVec includes POWER4 through POWER8 SIMD processing. POWER8 added in-core crypto, which provides accelerated AES, SHA and PMUL similar to ARMv8.1.
- ^ a b c d e When using RSA BSAFE Crypto-J in native mode using BSAFE Crypto-C Micro Edition
- ^ Crypto only provides access to the Padlock random number generator. Other functions, like AES acceleration, are not provided.
- ^ a b c d e f g When using the HotSpot JVM
- ^ OpenSSL RDRAND support is provided through the ENGINE interface. The RDRAND generator is not used by default.
Code size and code to comment ratio
[edit]Implementation | Source code size (kSLOC = 1000 lines of source code) |
Code to comment lines ratio |
---|---|---|
Botan | 133[54] | 4.55[54] |
Bouncy Castle | 1359[55] | 5.26[55] |
BSAFE Crypto-J | 271[a] | 1.3[a] |
cryptlib | 241 | 2.66 |
Crypto | 115[56] | 5.74[56] |
GnuTLS | 363[57] | 7.30[57] |
Java's default JCA/JCE providers | ||
Libgcrypt | 216[58] | 6.27[58] |
libsodium | 44[59] | 21.92[59] |
Mbed TLS | 105[60] | 33.9[60] |
Nettle | 111[61] | 4.08[61] |
OpenSSL | 472[62] | 4.41[62] |
wolfCrypt | 39 | 5.69 |
- ^ a b Based on Crypto-J 6.2.5, excluding tests source. Generated using https://github.com/XAMPPRocky/tokei
Portability
[edit]Implementation | Supported operating system | Thread safe |
---|---|---|
Botan | Linux, Windows, macOS, Android, iOS, FreeBSD, NetBSD, OpenBSD, DragonflyBSD, Solaris, AIX, QNX, Haiku | Yes |
Bouncy Castle | General Java API: J2ME, Java Runtime Environment 1.1 , Android. Java FIPS API: Java Runtime 1.5 , Android. C# API (General & FIPS): CLR 4. | |
BSAFE Crypto-J | Solaris, Linux, Android, FreeBSD, AIX, 32 and 64-bit Windows, macOS (Darwin) | Yes |
cryptlib | AMX, ARINC 653, BeOS, ChorusOS, CMSIS-RTOS/mbed-rtos, DOS, DOS32, eCOS, embOS, FreeRTOS/OpenRTOS, uItron, MQX, MVS, Nucleus, OS/2, Palm OS, QNX Neutrino, RTEMS, SMX, Tandem NonStop, Telit, ThreadX, uC/OS II, Unix (AIX, FreeBSD, HP-UX, Linux, macOS, Solaris, etc.), VDK, VM/CMS, VxWorks, Win16, Win32, Win64, WinCE/PocketPC/etc, XMK | Yes |
Crypto | Unix (AIX, OpenBSD, Linux, MacOS, Solaris, etc.), Win32, Win64, Android, iOS, ARM | Yes[a] |
GnuTLS | Runs on most Unix platforms and Windows[63] | ? |
Libgcrypt | All 32- and 64-bit Unix Systems (Linux, FreeBSD, NetBSD, macOS etc.), Win32, Win64, WinCE, and more | Yes[64] |
libsodium | macOS, Linux, OpenBSD, NetBSD, FreeBSD, DragonflyBSD, Android, iOS, 32 and 64-bit Windows (Visual Studio, MinGW, C Builder), NativeClient, QNX, JavaScript, AIX, MINIX, Solaris | Yes |
Mbed TLS | Win32/64, Unix Systems, embedded Linux, Micrium's μC/OS, FreeRTOS | ? |
OpenSSL | Solaris, IRIX, HP-UX, MPE/iX, Tru64, Linux, Android, BSD (OpenBSD, NetBSD, FreeBSD, DragonflyBSD), NextSTEP, QNX, UnixWare, SCO, AIX, 32 and 64-bit Windows (Visual Studio, MinGW, UWIN, CygWin), UEFI, macOS (Darwin), iOS, HURD, VxWorks, uClinux, VMS, DJGPP (DOS), Haiku | Yes |
wolfCrypt | Win32/64, Linux, macOS, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, NonStop, TRON/ITRON/μITRON, Micrium's μC/OS, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, HP-UX | Yes |
- ^ Crypto is thread safe at the object level, i.e. there is no shared data among instances. If two different threads access the same object then the user is responsible for locking.
References
[edit]- ^ "Botan: Release Notes". Retrieved 2024-08-13.
- ^ "Release Notes - bouncycastle.org". 2023-11-13. Retrieved 2023-11-18.
- ^ "Java LTS Resources - bouncycastle.org". 2024-03-01. Retrieved 2024-03-31.
- ^ "Java FIPS Resources - bouncycastle.org". 2023-09-28. Retrieved 2022-09-29.
- ^ "The Legion of the Bouncy Castle C# Cryptography APIs". 2024-02-05. Retrieved 2024-02-06.
- ^ "C# .NET FIPS Resources - bouncycastle.org". 2023-02-28. Retrieved 2023-02-28.
- ^ "Dell BSAFE Crypto-C Micro Edition 4.1.5 and Micro Edition Suite 4.6 Release Advisory".
- ^ "Dell BSAFE Micro Edition Suite 4.6.2 Release Advisory".
- ^ "Dell BSAFE Micro Edition Suite 5.0.2.1 Release Advisory".
- ^ "Dell BSAFE Crypto-J 7.0 Release Advisory".
- ^ "Dell BSAFE Crypto-J 6.3 Release Advisory".
- ^ Gutmann, Peter (2019). "Downloading". cryptlib. University of Auckland School of Computer Science. Retrieved 2019-08-07.
- ^ "gnutls 3.8.5".
- ^ "Java™ SE Development Kit 23, 23.0.1 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
- ^ "Java™ SE Development Kit 21, 21.0.5 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
- ^ "Java™ SE Development Kit 17, 17.0.13 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
- ^ "Java™ SE Development Kit 11, 11.0.25 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
- ^ "Java™ SE Development Kit 8, Update 431 Release Notes". Oracle Corporation. Retrieved 2024-10-16.
- ^ "LibreSSL 4.0.0 Released". 14 October 2024. Retrieved 15 October 2024.
- ^ "Libgcrypt 1.11.0 released". dev.gnupg.org. 2024-06-19. Retrieved 2024-06-20.
- ^ "Libgcrypt 1.8.11 released". dev.gnupg.org. 2023-11-16. Retrieved 2023-11-16.
- ^ "Mbed TLS releases". 2021-07-07. Retrieved 2021-10-14.
- ^ Downloading and installing NaCl, Bernstein, Lange, Schwabe, retrieved 2017-05-22
- ^ Niels Möller (16 June 2024). "ANNOUNCE: Nettle-3.10". Retrieved 16 June 2024.
- ^ a b "NSS:Release versions". Mozilla Wiki. Retrieved 7 November 2022.
- ^ "OpenSSL 3.4.0". 22 October 2024. Retrieved 22 October 2024.
- ^ "wolfSSL ChangeLog". 2023-10-31. Retrieved 2023-10-31.
- ^ "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-10-21.
- ^ a b c "Modules In Process List - Cryptographic Module Validation Program". CSRC.
- ^ "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-09-24.
- ^ "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-10-23.
- ^ "Search - Cryptographic Module Validation Program". CSRC. Retrieved 2022-05-29.
- ^ a b c d "Implementation Under Test List - Cryptographic Module Validation Program". CSRC.
- ^ "Search - Cryptographic Module Validation Program". CSRC. 11 October 2016.
- ^ https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search?SearchMode=Basic&ModuleName=libgcrypt&CertificateStatus=Active&ValidationYear=0 [dead link]
- ^ "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-09-24.
- ^ "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-04-14.
- ^ https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/3389 [bare URL]
- ^ RFC 7091
- ^ RFC 8018
- ^ RFC 5831
- ^ RFC 6986
- ^ RFC 5830
- ^ RFC 8891
- ^ RFC 7801
- ^ Bouncy Castle Specifications, bouncycastle.org, retrieved 2018-04-10
- ^ cryptlib Encryption Toolkit, Peter Gutmann, retrieved 2015-11-28
- ^ With Scute, scute.org
- ^ a b With GnuPG's SCdaemon & gpg-agent, gnupg.org
- ^ a b With an libp11 engine
- ^ hwfeatures.c, dev.gnupg.org
- ^ "WolfSSL Asynchronous Intel QuickAssist Support - wolfSSL". 18 January 2017.
- ^ "WolfSSL ARMv8 Support - wolfSSL". 13 October 2016.
- ^ a b Language Analysis of Botan, OpenHub.net, retrieved 2018-07-18
- ^ a b Language Analysis of Bouncy Castle, OpenHub.net, retrieved 2015-12-23
- ^ a b Language Analysis of Crypto , OpenHub.net, retrieved 2018-07-18
- ^ a b Language Analysis of GnuTLS, OpenHub.net, retrieved 2020-09-15
- ^ a b Language Analysis of Libgcrypt, OpenHub.net, retrieved 2015-12-23
- ^ a b Language Analysis of libsodium, OpenHub.net, retrieved 2017-05-07
- ^ a b Language Analysis of mbed-tls, OpenHub.net, retrieved 2019-09-15
- ^ a b Language Analysis of Nettle, OpenHub.net, retrieved 2015-12-23
- ^ a b Language Analysis of OpenSSL, OpenHub.net, retrieved 2017-05-07
- ^ GnuTLS - features, GnuTLS.org, retrieved 2022-09-15
- ^ GnuPG documentation: Libgcrypt overview - thread safety, GnuPG.org, retrieved 2016-04-16