We have released new versions of our core crypto and SSL/TLS libraries:
We have released the new IAIK PKCS#11 Provider version 1.4 and the new IAIK PKCS#11 Wrapper version 1.3. These versions now use UTF8 encoding for character array attributes and furthermore include some fixes and enhancement for improved usability.
The IAIK Provider for the Java™ Cryptography Extension (IAIK-JCE) is a set of APIs and implementations of cryptographic functionality, including hash functions, message authentication codes, symmetric, asymmetric, stream, and block encryption, key and certificate management. It supplements the security functionality of the default JDK.
IAIK proudly presents the IAIK ECCelerate™ library for the Java™ platform. IAIK ECCelerate™ was built from scratch and replaces our old IAIK-ECC library. It is based on Java 5/6 technology and offers easy to use elliptic curve cryptography, like ECDSA and ECDH, compliant with current standards. ECCelerate™ is an addon to the IAIK JCE provider (of version 4.0 or higher), which you have to download and install separately.
The JCE CC Core is a Common Criteria evaluated version of most of the cryptographic functionality of the IAIK-JCE toolkit.
This product allows easy integration of smart cards, USB tokens and HSMs into Java™ applications. It provides a simple java.security.KeyStore view of these tokens and makes cryptographic operations of these devices accessible via the JCA/JCE framework. For the application, it is just like working with pure software crypto and file key stores. The library accesses the hardware tokens via the PKCS#11 API, also known as Cryptoki. Hence, it can work with any product which supports PKCS#11.
This is a library for the Java™ platform which makes PKCS#11 (also known as Cryptoki) modules accessible from within Java™. A PKCS#11 module is a software library with a defined API which allows access to cryptographic hardware. It usually comes with hardware security modules (HSM), smart cards and crypto tokens (e.g. USB tokens). Thus, the PKCS#11 Wrapper provides Java™ software access to almost any crypto hardware. For example, a Java™ application can use it to integrate a HSM or a smart card to create digital signatures, to decrypt data or to unwrap keys. We provide this library with an apache-style license.
The IAIK SHA-3 Provider provides performance-optimized Java implementations of the five SHA-3 finalists: BLAKE, Grøstl, JH, Keccak, and Skein.