Comparison of cryptography libraries

Last updated

The tables below compare cryptography libraries that deal with cryptography algorithms and have application programming interface (API) function calls to each of the supported features.

Contents

Cryptography libraries

Name of implementationInitiativeMain implementation language Open-source software Software license Latest release
Botan Jack LloydC++Yes Simplified BSD 3.8.1 (May 7, 2025;2 months ago (2025-05-07) [1] ) [±]
Bouncy Castle Legion of the Bouncy Castle Inc.Java, C#Yes MIT License
Java1.81 / June 4, 2025;2 months ago (2025-06-04) [2]
Java LTSBC-LJA 2.73.7 / November 8, 2024;8 months ago (2024-11-08) [3]
Java FIPSBC-FJA 2.0.0 / July 30, 2024;12 months ago (2024-07-30) [4]
C#2.6.1 / May 22, 2025;2 months ago (2025-05-22) [5]
C# FIPSBC-FNA 1.0.2 / March 11, 2024;16 months ago (2024-03-11) [6]
BSAFE Dell, formerly RSA Security Java, C, AssemblyNo Proprietary Crypto-C Micro Edition: 4.1.5 (December 17, 2020;4 years ago (2020-12-17) [7] ) [±]


Micro Edition Suite: 5.0.3 (December 3, 2024;8 months ago (2024-12-03) [8] ) [±]
Crypto-J: 7.1 (July 30, 2025;5 days ago (2025-07-30) [9] ) [±]

6.3.1 (May 15, 2025;2 months ago (2025-05-15) [10] ) [±]

cryptlib Peter Gutmann CYes Sleepycat License or commercial license3.4.8 (2025;0 years ago (2025) [11] ) [±]
Crypto++ The Crypto++ projectC++Yes Boost (all individual files are public domain)Jan 10, 2023 (8.9.0)
GnuTLS Nikos Mavrogiannopoulos, Simon JosefssonCYes LGPL-2.1-or-later 3.8.9 [12]   OOjs UI icon edit-ltr-progressive.svg 2025-02-08
Intel Cryptography Primitives Library Intel C, ASMYes Apache 2.0 March 2025 (2025.1.0 / 1.1.0)
Java's default JCA/JCE providers Oracle JavaYes GNU GPL v2 and commercial license

24.0.1 (April 15, 2025;3 months ago (2025-04-15) [13] ) [±]
21.0.5 LTS (October 15, 2024;9 months ago (2024-10-15) [14] ) [±]
17.0.13 LTS (October 15, 2024;9 months ago (2024-10-15) [15] ) [±]
11.0.25 LTS (October 15, 2024;9 months ago (2024-10-15) [16] ) [±]
8u431 LTS (October 15, 2024;9 months ago (2024-10-15) [17] ) [±]

LibreSSL OpenBSD FoundationCYes Apache 1.0 4.1.0 [18]   OOjs UI icon edit-ltr-progressive.svg 2025-04-30
Libgcrypt GnuPG community and g10codeCYes GNU LGPL v2.1+
stable1.11.0 / June 19, 2024;13 months ago (2024-06-19) [19]
LTS1.8.11 / November 16, 2023;20 months ago (2023-11-16) [20]
libsodium Frank DenisCYes ISC Sep 13, 2023 (1.0.19)
Mbed TLS Arm Limited CYes Apache 2.0 3.0.0 (July 7, 2021;4 years ago (2021-07-07) [21] ) [±]

2.27.0 (July 7, 2021;4 years ago (2021-07-07)) [±]
2.16.11 (July 7, 2021;4 years ago (2021-07-07)) [±]

NaCl Daniel J. Bernstein, Tanja Lange, Peter SchwabeCYes Public domain February 21, 2011 [22]
Nettle CYes GNU GPL v2+ or GNU LGPL v3

3.10.2 [23]   OOjs UI icon edit-ltr-progressive.svg 2025-06-26

Network Security Services (NSS) Mozilla CYes MPL 2.0
Standard3.84 / October 12, 2022;2 years ago (2022-10-12) [24]
Extended Support Release3.79.1 / August 18, 2022;2 years ago (2022-08-18) [24]
OpenSSL The OpenSSL ProjectCYes Apache 2.0 3.5.1 [25]   OOjs UI icon edit-ltr-progressive.svg 2025-07-01
wolfCrypt wolfSSL, Inc.CYes GNU GPL v3 or commercial license5.8.2 (July 17, 2025;18 days ago (2025-07-17) [26] ) [±]

FIPS 140

This table denotes, if a cryptography library provides the technical requisites for FIPS 140, and the status of their FIPS 140 certification (according to NIST's CMVP search, [27] modules in process list [28] and implementation under test list). [29]

ImplementationFIPS 140-2 mode FIPS 140-2 validated FIPS 140-3 validated
Botan NoNoNo
Bouncy Castle YesYes [30] Yes [31]
BSAFE YesYes [32] [33] Yes [34]
cryptlib YesNoNo
Crypto++ NoNo [a] No
GnuTLS NoYes [35] [b] In process [36]
Intel Cryptography Primitives LibraryNo [c] No [c] No [c]
Java's default JCA/JCE providersNoNo [37] [d] No
Libgcrypt YesYes [38] [e] In process [36]
libsodium NoNoNo
Mbed TLS NoNoNo
NaCl NoNoNo
Nettle NoNoNo
Network Security Services (NSS)YesYes [39] [f] In process [36]
OpenSSL YesYes [40] [g] In process [36]
wolfCrypt YesYes [41] Yes [42]
  1. Crypto++ received three FIPS 140 validations from 2003 through 2008. In 2016 NIST moved Crypto++ to the Historical Validation List.
  2. While GnuTLS is not FIPS 140-2 validated by GnuTLS.org, validations exist for versions from Amazon Web Services Inc., Oracle Corporation, Red Hat Inc. and SUSE LLC.
  3. 1 2 3 Intel Cryptography Primitives Library is not FIPS 140-3 validated but FIPS 140-3 compliant.
  4. While none of default JDK JCA/JCE providers is FIPS 140-2 validated, there are other JCE/JCA third party providers which are FIPS 140-2 validated.
  5. While Libgcrypt is not FIPS 140-2 validated by g10code, validations exist for versions from Amazon Web Services Inc., Canonical Ltd., Oracle Corporation, Red Hat Inc. and SUSE LLC.
  6. While the Network Security Services (NSS) are not FIPS 140-2 validated by the Mozilla Foundation, validations exist for versions from Amazon Web Services Inc., Canonical Ltd., Cisco Systems Inc., Hewlett Packard Enterprise, Oracle Corporation, Red Hat Inc., SafeLogic Inc., SUSE LLC and Trend Micro Inc.
  7. While OpenSSL is not FIPS 140-2 validated by OpenSSL.org, validations exist for versions from Amazon Web Services Inc., Aqua Security Software Ltd., Broadcom Inc., Canonical Ltd., Cisco Systems Inc., Cohesity Inc., ControlUp Technologies Inc., Crestron Electronics Inc., Dell Inc., Gallagher Group, Hewlett Packard Enterprise, IBM Corporation, ICU Medical Inc., Intelligent Waves, Ixia, KeyPair Consulting Inc., Koninklijke Philips N.V., Lenovo Group Limited, LG Electronics Inc., LogRhythm, McAfee LLC, Metaswitch Networks Ltd, NetBrain Technologies Inc., Nutanix Inc., Onclave Networks Inc., Oracle Corporation, REDCOM Laboratories Inc., Red Hat Inc., SafeLogic Inc., Super Micro Computer Inc., SUSE LLC, Tanium Inc., Trend Micro Inc., Unisys Corporation, Verizon, VMware Inc. and Wickr Inc.

Key operations

Key operations include key generation algorithms, key exchange agreements, and public key cryptography standards.

Public key algorithms

Implementation RSA DSA ECDSA EdDSA Ed448 DH ECDH ECIES ElGamal NTRU
(IEEE P1363.1)
DSS
Botan YesYesYesYesYesYesYesYesYesNoYes
Bouncy Castle YesYesYesYesYesYesYesYesYesYesYes
BSAFE YesYesYesNoNoYesYesYesNoNoNo
cryptlib YesYesYesNoNoYesYesNoYesNoYes
Crypto++ YesYesYesNoNoYesYesYesYesNoYes
GnuTLS YesNoNoNoNoNoNoNoNoNoNo
Intel Cryptography Primitives LibraryYesYesYesYesNoYesYesNoNoNoYes
Java's default JCA/JCE providersYesYesYesYesYesYesYesNoNoNoYes
Libgcrypt YesYesYesYesYesYesYes [a] NoYesNoYes
libsodium NoNoNoYesNoNoNoNoNoNoNo
Mbed TLS YesYesYesNoNoYesYesNoNoNoNo
Nettle YesYesNoYesNoNoNoNoNoNoNo
OpenSSL YesYesYesYesYesYesYesNoNoNoNo
wolfCrypt YesYesYesYesYesYesYesYesNoYesYes
  1. By using the lower level interface.

Elliptic-curve cryptography (ECC) support

Implementation NIST SECG ECC Brainpool Curve25519 Curve448 GOST R 34.10 [43] SM2
Botan YesYesYesYesYesYesYes
Bouncy Castle YesYesYesYesYesYesYes
BSAFE YesYesNoNoNoNoNo
cryptlib YesYesYesNoNoNoNo
Crypto++ YesYesYesYesNoNoNo
GnuTLS YesNoNoNoNoNoNo
Intel Cryptography Primitives LibraryYesNoNoYes [a] NoNoYes
Java's default JCA/JCE providersYesYesNoYesYesNoNo
Libgcrypt YesYesYesYesYesYesYes
libsodium YesNoNoYesYesNoNo
Mbed TLS YesYesYesYesNoNoNo
Nettle YesPartialNoYesNoNoNo
OpenSSL YesYesYesYesYesYesYes
wolfCrypt YesYesYesYesYesNoYes
  1. Supported in Intel Cryptography Primitives Library multi-buffer API only (not supported in single-buffer API).

Public key cryptography standards

Implementation PKCS #1 PKCS #5, [44] PBKDF2 PKCS #8 PKCS #12 IEEE P1363 ASN.1
Botan YesYesYesNoYesYes
Bouncy Castle YesYesYesYesYesYes
BSAFE Crypto-JYesYesYesYesNoYes
cryptlib YesYesYesYesNoYes
Crypto++ YesYesYes [a] NoYesYes
GnuTLS
Intel Cryptography Primitives LibraryYesNoNoNoYesNo
Java's default JCA/JCE providersYesYesYesYesYesYes
Libgcrypt YesYes [b] Yes [b] Yes [b] Yes [b] Yes [b]
libsodium NoNoNoNoNoNo
Mbed TLS YesNoYesYesNoYes
Nettle YesYesNoNoNoNo
OpenSSL YesYesYesYesNoYes
wolfCrypt YesYesYesYesNoYes
  1. The library offers X.509 and PKCS #8 encoding without PEM by default. For PEM encoding of public and private keys the PEM Pack is needed.
  2. 1 2 3 4 5 These Public Key Cryptographic Standards (PKCS) are supported by accompanying libraries and tools, which are also part of the GnuPG framework, although not by the actual libgcrypt library.

Hash functions

Comparison of supported cryptographic hash functions. Here hash functions are defined as taking an arbitrary length message and producing a fixed size output that is virtually impossible to use for recreating the original message.

Implementation MD5 SHA-1 SHA-2 SHA-3 RIPEMD-160 Tiger Whirlpool BLAKE2 GOST R 34.11-94 [45]
(aka GOST 34.311-95)
GOST R 34.11-2012
(Stribog)
[46]
SM3
Botan YesYesYesYesYesYesYesYesYesYesYes
Bouncy Castle YesYesYesYesYesYesYesYesYesYesYes
BSAFE Crypto-JYesYesYesYesYesNoNoNoNoNoNo
cryptlib YesYesYesYesYesNoYesNoNoNoNo
Crypto++ YesYesYesYesYesYesYesYesYesNoYes
GnuTLS
Intel Cryptography Primitives LibraryYesYesYesYesNoNoNoNoNoNoYes
Java's default JCA/JCE providersYesYesYesYesNoNoNoNoNoNoNo
Libgcrypt YesYesYesYesYesYesYesYesYesYesYes
libsodium NoNoYesNoNoNoNoYesNoNoNo
Mbed TLS YesYesYesYesYesNoNoNoNoNoNo
Nettle YesYesYesYesYesNoNoNoYesNoNo
OpenSSL YesYesYesYesYesYesYesYesYesNoYes
wolfCrypt YesYesYesYesYesNoNoYesNoNoYes

MAC algorithms

Comparison of implementations of message authentication code (MAC) algorithms. A MAC is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed in transit (its integrity).

Implementation HMAC-MD5 HMAC-SHA1 HMAC-SHA2 Poly1305 BLAKE2-MAC
Botan YesYesYesYesYes
Bouncy Castle YesYesYesYesYes
BSAFE Crypto-JYesYesYesYesNo
cryptlib YesYesYesYesNo
Crypto++ YesYesYesYesYes
GnuTLS
Intel Cryptography Primitives LibraryYesYesYesNoNo
Java's default JCA/JCE providersYesYesYesNoNo
Libgcrypt YesYesYesYesYes
libsodium NoNoYesYesYes
Mbed TLS YesYesYesNoNo
Nettle YesYesYesYesNo
OpenSSL YesYesYesYesYes
wolfCrypt YesYesYesYesYes

Block ciphers

Table compares implementations of block ciphers. Block ciphers are defined as being deterministic and operating on a set number of bits (termed a block) using a symmetric key. Each block cipher can be broken up into the possible key sizes and block cipher modes it can be run with.

Block cipher algorithms

Implementation AES 3DES Camellia Blowfish Twofish IDEA CAST5 ARIA GOST 28147-89 [47]
/ GOST R 34.12-2015
(Magma [48] & Kuznyechik [49] )
SM4
Botan YesYesYesYesYesYesYesYesYesYes
Bouncy Castle [50] YesYesYesYesYesYesYesYesYesYes
BSAFE Crypto-JYesYesNoNoNoNoNoNoNoNo
cryptlib [51] YesYesNoYesNoYesYesNoNoNo
Crypto++ YesYesYesYesYesYesYesYesPartial [a] Yes
GnuTLS YesNoYesNoNoNoNoNoNoNo
Intel Cryptography Primitives LibraryYesYesNoNoNoNoNoNoNoYes
Java's default JCA/JCE providersYesYesNoYesNoNoNoNoNoNo
Libgcrypt YesYesYesYesYesYesYesYesYesYes
libsodium Partial [b] NoNoNoNoNoNoNoNoNo
Mbed TLS YesYesYesYesNoNoNoNoNoNo
Nettle YesYesYesYesNoNoNoNoNoNo
OpenSSL YesYesYesYesNoYesYesYesYesYes
wolfCrypt YesYesYesNoNoYesNoYesNoYes
  1. Crypto++ only supports GOST 28147-89, but not GOST R 34.12-2015.
  2. libsodium only supports AES-256, but not AES-128 or AES-192.

Cipher modes

Implementation ECB CBC OFB CFB CTR CCM GCM OCB XTS AES-Wrap Stream EAX
Botan NoYesYesYesYesYesYesYesYesYesYesYes
Bouncy Castle YesYesYesYesYesYesYesYesNoYesYesYes
BSAFE YesYesYesYesYesYesYesNoYesYesYesNo
cryptlib YesYesYesYesYesNoYesNoNoNoNoNo
Crypto++ YesYesYesYesYesYesYesNoYesNoYesYes
GnuTLS
Intel Cryptography Primitives LibraryYesYesYesYesYesYesYesNoYesNoYesNo
Java's default JCA/JCE providersYesYesYesYesYesNoYesNoNoYesYesNo
Libgcrypt YesYesYesYesYesYesYesYesYesYesYesYes
libsodium NoNoNoNoYesNoYesNoNoNoNoNo
Mbed TLS YesYesNoYesYesYesYesNoNoNoNoNo
Nettle YesYesNoNoYesYesYesNoNoNoNoNo
OpenSSL YesYesYesYesYesYesYesYesYesYesYesNo
wolfCrypt YesYesYesYesYesYesYesNoYesYesYesYes

Stream ciphers

The table below shows the support of various stream ciphers. Stream ciphers are defined as using plain text digits that are combined with a pseudorandom cipher digit stream. Stream ciphers are typically faster than block ciphers and may have lower hardware complexity, but may be more susceptible to attacks.

Implementation RC4 HC-256 Rabbit Salsa20 ChaCha SEAL Panama WAKE Grain VMPC ISAAC
Botan YesNoNoYesYesNoNoNoNoNoNo
Bouncy Castle YesYesNoYesYesNoNoNoYesYesYes
BSAFE Crypto-JYesNoNoNoYesNoNoNoNoNoNo
cryptlib YesNoNoNoYesNoNoNoNoNoNo
Crypto++ YesYesYesYesYesYesYesYesNoNoNo
GnuTLS
Intel Cryptography Primitives LibraryNoNoNoNoNoNoNoNoNoNoNo
Java's default JCA/JCE providersYesNoNoNoYesNoNoNoNoNoNo
Libgcrypt YesNoNoYesYesNoNoNoNoNoNo
libsodium NoNoNoYesYesNoNoNoNoNoNo
Mbed TLS YesNoNoNoYesNoNoNoNoNoNo
Nettle YesNoNoYesYesNoNoNoNoNoNo
OpenSSL YesNoNoNoYesNoNoNoNoNoNo
wolfCrypt YesNoNoYesYesNoNoNoNoNoNo

Hardware-assisted support

These tables compare the ability to use hardware enhanced cryptography. By using the assistance of specific hardware, the library can achieve greater speeds and/or improved security than otherwise.

Smart card, SIM, HSM protocol support

Implementation PKCS #11 PC/SC CCID
Botan YesNoNo
Bouncy Castle Yes [a] NoNo
BSAFE Yes [b] NoNo
cryptlib YesNoNo
Crypto++ NoNoNo
GnuTLS YesNoNo
Intel Cryptography Primitives LibraryNoNoNo
Java's default JCA/JCE providersYesNo [c] No [c]
Libgcrypt Yes [52] Yes [53] Yes [53]
libsodium NoNoNo
Mbed TLS Yes [54] NoNo
OpenSSL Yes [54] NoNo
wolfCrypt YesNoNo
  1. In conjunction with the PKCS#11 provider, or through the implementation of operator interfaces providing access to basic operations.
  2. When using BSAFE Crypto-J in native mode using BSAFE Crypto-C Micro Edition.
  3. 1 2 Support is available through javax.smartcardio package of JDK.

General purpose CPU, platform acceleration support

Implementation AES-NI SSSE3, SSE4.1 AVX, AVX2 AVX-512 RDRAND VIA PadLock Intel QuickAssist ARMv7-A NEON ARMv8-A cryptography instructions Power ISA v2.03 (AltiVec [a] ) Power ISA v2.07 (e.g., POWER8 and later [a] )
Botan YesYesYesYesYesNoNoYesYesYesYes
BSAFE Yes [b] Yes [b] Yes [b] NoYes [b] NoNoNoYes [b] NoNo
cryptlib YesYesYesNoYesYesNoNoNoNoNo
Crypto++ YesYesYesNoYesYes [c] NoYesYesYesYes
GnuTLS YesNoNoNoNoYesNoNoNoNoNo
Intel Cryptography Primitives LibraryYesYesYesYesYesNoNoNoNoNoNo
Java's default JCA/JCE providersYes [d] Yes [d] Yes [d] Yes [d] Yes [d] NoNoNoYes [d] NoYes [d]
Libgcrypt [55] YesYesYesYesYesYesNoYesYesNoYes
libsodium YesYesYesNoNoNoNoNoNoNoNo
OpenSSL YesYesYesYesYes [e] YesNoYesYesYesYes
wolfCrypt YesYesYesNoYesNoYes [56] YesYes [57] NoNo
  1. 1 2 AltiVec includes POWER4 through POWER8 SIMD processing. POWER8 added in-core crypto, which provides accelerated AES, SHA and PMUL similar to ARMv8.1.
  2. 1 2 3 4 5 When using RSA BSAFE Crypto-J in native mode using BSAFE Crypto-C Micro Edition
  3. Crypto++ only provides access to the Padlock random number generator. Other functions, like AES acceleration, are not provided.
  4. 1 2 3 4 5 6 7 When using the HotSpot JVM
  5. OpenSSL RDRAND support is provided through the ENGINE interface. The RDRAND generator is not used by default.

Code size and code to comment ratio

Implementation Source code size

(kSLOC = 1000 lines of source code)

Code to comment lines ratio
Botan 133 [58] 4.55 [58]
Bouncy Castle 1359 [59] 5.26 [59]
BSAFE Crypto-J271 [a] 1.3 [a]
cryptlib 2412.66
Crypto++ 115 [60] 5.74 [60]
GnuTLS 363 [61] 7.30 [61]
Java's default JCA/JCE providers
Libgcrypt 216 [62] 6.27 [62]
libsodium 44 [63] 21.92 [63]
Mbed TLS 105 [64] 33.9 [64]
Nettle 111 [65] 4.08 [65]
OpenSSL 472 [66] 4.41 [66]
wolfCrypt 395.69
  1. 1 2 Based on Crypto-J 6.2.5, excluding tests source. Generated using https://github.com/XAMPPRocky/tokei

Portability

ImplementationSupported operating systemThread safe
Botan Linux, Windows, macOS, Android, iOS, FreeBSD, NetBSD, OpenBSD, DragonflyBSD, Solaris, AIX, QNX, HaikuYes
Bouncy Castle General Java API: J2ME, Java Runtime Environment 1.1+, Android. Java FIPS API: Java Runtime 1.5+, Android. C# API (General & FIPS): CLR 4.
BSAFE Crypto-JSolaris, Linux, Android, FreeBSD, AIX, 32 and 64-bit Windows, macOS (Darwin)Yes
cryptlib AMX, ARINC 653, BeOS, ChorusOS, CMSIS-RTOS/mbed-rtos, DOS, DOS32, eCOS, embOS, FreeRTOS/OpenRTOS, uItron, MQX, MVS, Nucleus, OS/2, Palm OS, QNX Neutrino, RTEMS, SMX, Tandem NonStop, Telit, ThreadX, uC/OS II, Unix (AIX, FreeBSD, HP-UX, Linux, macOS, Solaris, etc.), VDK, VM/CMS, VxWorks, Win16, Win32, Win64, WinCE/PocketPC/etc, XMKYes
Crypto++ Unix (AIX, OpenBSD, Linux, MacOS, Solaris, etc.), Win32, Win64, Android, iOS, ARMYes [a]
GnuTLS Runs on most Unix platforms and Windows [67]  ?
Intel Cryptography Primitives LibraryWindows 10/11, Windows Server 2019/2022, Red Hat Enterprise Linux (RHEL) 8/9, SUSE Linux Enterprise Server (SLES) 15 SP4 / SP5 / SP6, Ubuntu 22.04 LTS / 24.04 LTS, Rocky Linux 9, Fedora 39 / 40, Debian 12Yes
Libgcrypt All 32- and 64-bit Unix Systems (Linux, FreeBSD, NetBSD, macOS etc.), Win32, Win64, WinCE, and moreYes [68]
libsodium macOS, Linux, OpenBSD, NetBSD, FreeBSD, DragonflyBSD, Android, iOS, 32 and 64-bit Windows (Visual Studio, MinGW, C++ Builder), NativeClient, QNX, JavaScript, AIX, MINIX, SolarisYes
Mbed TLS Win32/64, Unix Systems, embedded Linux, Micrium's μC/OS, FreeRTOS ?
OpenSSL Solaris, IRIX, HP-UX, MPE/iX, Tru64, Linux, Android, BSD (OpenBSD, NetBSD, FreeBSD, DragonflyBSD), NextSTEP, QNX, UnixWare, SCO, AIX, 32 and 64-bit Windows (Visual Studio, MinGW, UWIN, CygWin), UEFI, macOS (Darwin), iOS, HURD, VxWorks, uClinux, VMS, DJGPP (DOS), HaikuYes
wolfCrypt Win32/64, Linux, macOS, Solaris, ThreadX, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, Yocto Linux, OpenEmbedded, WinCE, Haiku, OpenWRT, iPhone (iOS), Android, Nintendo Wii and Gamecube through DevKitPro, QNX, MontaVista, NonStop, TRON/ITRON/μITRON, Micrium's μC/OS, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, HP-UX, AIX, ARC MQX, TI-RTOS, uTasker, embOS, INtime, Mbed, uT-Kernel, RIOT, CMSIS-RTOS, FROSTED, Green Hills INTEGRITY, Keil RTX, TOPPERS, PetaLinux, Apache Mynewt, PikeOS, Deos, Azure Sphere OS, ZephyrYes
  1. Crypto++ is thread safe at the object level, i.e. there is no shared data among instances. If two different threads access the same object then the user is responsible for locking.

References

  1. "Botan: Release Notes" . Retrieved 2025-05-16.
  2. "Download Bouncy Castle for Java - bouncycastle.org". 2025-08-04. Retrieved 2025-08-04.
  3. "Download Bouncy Castle for Java LTS - bouncycastle.org". 2024-11-08. Retrieved 2024-11-29.
  4. "Download Bouncy Castle for Java FIPS - bouncycastle.org". 2024-07-30. Retrieved 2024-11-29.
  5. "Download Bouncy Castle for C# .NET - bouncycastle.org". 2025-08-04. Retrieved 2025-08-04.
  6. "Download Bouncy Castle for C# .NET FIPS - bouncycastle.org". 2024-03-11. Retrieved 2024-11-29.
  7. "Dell BSAFE Crypto-C Micro Edition 4.1.5 and Micro Edition Suite 4.6 Release Advisory".
  8. "Dell BSAFE Micro Edition Suite 5.0.3 Release Advisory".
  9. "Dell BSAFE Crypto-J 7.1 Release Advisory".
  10. "Dell BSAFE Crypto-J 6.3.1 Release Advisory".
  11. Gutmann, Peter (May 1, 2025). "cryptlib". Github. Retrieved 2025-08-02.
  12. Daiki Ueno (8 February 2025). "gnutls 3.8.9" . Retrieved 13 February 2025.
  13. "Java™ SE Development Kit 24, 24.0.1 Release Notes". Oracle Corporation . Retrieved 2025-06-09.
  14. "Java™ SE Development Kit 21, 21.0.5 Release Notes". Oracle Corporation . Retrieved 2024-10-16.
  15. "Java™ SE Development Kit 17, 17.0.13 Release Notes". Oracle Corporation . Retrieved 2024-10-16.
  16. "Java™ SE Development Kit 11, 11.0.25 Release Notes". Oracle Corporation . Retrieved 2024-10-16.
  17. "Java™ SE Development Kit 8, Update 431 Release Notes". Oracle Corporation . Retrieved 2024-10-16.
  18. Brent Cook (30 April 2025). "LibreSSL 4.1.0 Released" . Retrieved 30 April 2025.
  19. "Libgcrypt 1.11.0 released". dev.gnupg.org. 2024-06-19. Retrieved 2024-06-20.
  20. "Libgcrypt 1.8.11 released". dev.gnupg.org. 2023-11-16. Retrieved 2023-11-16.
  21. "Mbed TLS releases". 2021-07-07. Retrieved 2021-10-14.
  22. Downloading and installing NaCl, Bernstein, Lange, Schwabe, retrieved 2017-05-22
  23. Niels Möller (26 June 2025). "ANNOUNCE: nettle-3.10.2" . Retrieved 26 June 2025.
  24. 1 2 "NSS:Release versions". Mozilla Wiki. Retrieved 7 November 2022.
  25. "OpenSSL 3.5.1". 1 July 2025. Retrieved 1 July 2025.
  26. "wolfSSL ChangeLog". 2025-07-17. Retrieved 2025-07-17.
  27. Computer Security Division, Information Technology Laboratory (2016-10-11). "Search - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22.
  28. Computer Security Division, Information Technology Laboratory (2016-10-11). "Modules In Process List - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST. Retrieved 2024-11-22.
  29. "Cryptographic Module Validation Program CMVP". csrc.nist.gov. 11 October 2016.
  30. "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-10-21.
  31. "Certificate #4743". CSRC. 16 February 2025.
  32. "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-09-24.
  33. "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-10-23.
  34. "Cryptographic Module Validation Program | CSRC".
  35. "Search - Cryptographic Module Validation Program". CSRC. Retrieved 2022-05-29.
  36. 1 2 3 4 "Implementation Under Test List - Cryptographic Module Validation Program". CSRC. 11 October 2016.
  37. "Search - Cryptographic Module Validation Program". CSRC. 11 October 2016.
  38. Computer Security Division, Information Technology Laboratory (October 11, 2016). "Search - Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST.
  39. "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-09-24.
  40. "Cryptographic Module Validation Program". CSRC.nist.gov. Archived from the original on 2021-04-14.
  41. Computer Security Division, Information Technology Laboratory (October 11, 2016). "Cryptographic Module Validation Program | CSRC | CSRC". CSRC | NIST.
  42. "Cryptographic Module Validation Program | CSRC".
  43. RFC   7091
  44. RFC   8018
  45. RFC   5831
  46. RFC   6986
  47. RFC   5830
  48. RFC   8891
  49. RFC   7801
  50. Bouncy Castle Specifications, bouncycastle.org, retrieved 2018-04-10
  51. cryptlib Encryption Toolkit, Peter Gutmann, retrieved 2015-11-28
  52. With Scute, scute.org
  53. 1 2 With GnuPG's SCdaemon & gpg-agent, gnupg.org
  54. 1 2 With an libp11 engine
  55. hwfeatures.c, dev.gnupg.org
  56. "WolfSSL Asynchronous Intel QuickAssist Support - wolfSSL". 18 January 2017.
  57. "WolfSSL ARMv8 Support - wolfSSL". 13 October 2016.
  58. 1 2 Language Analysis of Botan, OpenHub.net, retrieved 2018-07-18
  59. 1 2 Language Analysis of Bouncy Castle, OpenHub.net, retrieved 2015-12-23
  60. 1 2 Language Analysis of Crypto++, OpenHub.net, retrieved 2018-07-18
  61. 1 2 Language Analysis of GnuTLS, OpenHub.net, retrieved 2020-09-15
  62. 1 2 Language Analysis of Libgcrypt, OpenHub.net, retrieved 2015-12-23
  63. 1 2 Language Analysis of libsodium, OpenHub.net, retrieved 2017-05-07
  64. 1 2 Language Analysis of mbed-tls, OpenHub.net, retrieved 2019-09-15
  65. 1 2 Language Analysis of Nettle, OpenHub.net, retrieved 2015-12-23
  66. 1 2 Language Analysis of OpenSSL, OpenHub.net, retrieved 2017-05-07
  67. GnuTLS - features, GnuTLS.org, retrieved 2022-09-15
  68. GnuPG documentation: Libgcrypt overview - thread safety, GnuPG.org, retrieved 2016-04-16