Bouncy Castle
Bouncy Castle Crypto APIs | |
---|---|
Basic data
|
|
Maintainer | Legion of the Bouncy Castle Inc. |
Current version | Java release 1.66 (July 4, 2020), C # release 1.8.6 (February 21, 2020) |
operating system | Platform independence |
programming language | Java and C # |
category | cryptographic API |
License | MIT license |
bouncycastle.org |
Bouncy Castle Crypto API are a collection of open source cryptographic programming interfaces (API) for the programming languages Java and C # . They are looked after by the Australia-based Legion of the Bouncy Castle Inc.
description
The Bouncy Castle Crypto APIs contain a provider for JCE and JCA , which is based on a direct programming interface for Java ( lightweight API ), as well as components for various protocols ( OpenPGP , S / MIME , CMS , TSP , CMP ) and certificates ( CRMF , PKCS # 10 , X.509 ). The lean library can be used with any Java version up to JDK 1.8 and with J2ME . The Bouncy Castle Crypto APIs also include an interface for the C # programming language, but it does not contain all of the algorithms in the Java libraries. All components are under the MIT license .
history
The first official version for Java appeared in May 2000 and consisted of 27,000 lines of source code. After that, the library grew rapidly. The first version for C # appeared in 2006. The non-profit organization Bouncy Castle Inc. was only founded in 2013. Java version 1.52 now includes around 499,000 lines of source code. A section of the Java libraries was certified as a FIPS standard in October 2016 .
Web links
- Bouncy Castle website .
- Release Notes from Bouncy Castle .
- kpbe An open source password-based file encryption program that uses the C # implementation of Bouncy Castle.
- JCrypTool (JCT) is a widespread open source e-learning program that represents over 100 cryptographic and cryptanalytic processes. JCT uses the Java implementation of the Bouncy Castle. JCT is based on Java / Eclipse / RCP / SWT and runs on Windows, MacOS and Linux. Compare CrypTool .
Individual evidence
- ↑ Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules ( Memento of the original from December 26, 2014 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice. , NIST : List of FIPS certified modules 2016