print Print
Logo: Stiftung Secure Information and Communication Technologies SIC Stiftung Secure Information and Communication Technologies SIC

All Products

All Products
SIC offers a wide range of cryptography- and security-related products for the Java™ platform, covering all aspects of data and communication security. See our complete product list below!
 

Proxy Tunnel

Version: 1.8

IAIK Proxy Tunnel is available for free. The Proxy Tunnel is an application based on IAIK JCE and iSaSiLk that makes it possible to add security features to existing applications and protocols without changing the underlying applications.

TSP

Version: 2.32

 The Timestamp API (TSP-API) provides all needed functionality to develop a Timestamp Server or Client.
 

Download the Product Highlights Brochure! 

XSECT

Version: 2.13

IAIK XML Security Toolkit (XSECT) implements the upcoming APIs for the Java™ platform

  • XML Digital Signatures APIs for the Java™ platform
  • XML Digtial Encryption APIs for the Java™ platform

as specified by the Java™ Specification Request JSR#105 and JSR#106 respectively.

XAdES

Version: 2.13

 IAIK XML Advanced Electronic Signatures (XAdES) add-on for XML Security Toolkit (XSECT) 

IAIK-XAdES is the optimal add-on to our XSECT XML signature library enhancing it about useful properties as signing time and signing place and signature processing facilities for long term electronic document archiving. The toolkit enables the creation of advanced electronic signatures that remain valid over a long period of time and are compliant with the EU directive on electronic signatures.

 Main Features 

  • Java™ implementation of XML Advanced Electronic Signatures (XAdES) ETSI TS 101 903 V1.4.2 (2010-12) and (new!) ETSI EN 319 132 v1.1.0 (2016-02) Technical Specifications
  • Works on JDK 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8 and compatible.

 Cryptographic Provider Independence: 

  • Can be used with any JCA/JCE 1.2 compliant cryptography provider as long as IAIK's JCE is in the classpath.
  • Provisions for easy integration of smartcards and other hardware security modules
  • Delivered with the IAIK-JCE provider and IAIK-XSECT by default

[CP]AdES

Version: 2.2

The IAIK [CP]AdES toolkit abstracts the creation and verification of signed PDF documents and CAdES signatures. The structure of the toolkit is highly similar to a typical signature engine in the JCA/JCE framework and allows you to easily create signatures compliant to the PAdES and CAdES specifications by using dedicated parameter classes. The official ETSI website providing these specifications can be found here.

Performance-optimized AES Implementation for 8051-based Microcontrollers

For 8051-based microcontrollers we offer a performance-optimized AES implementation. The implementations is the result of our research in implementing cryptographic algorithms. To get best performance it is coded in assembler. It provides a simple interface implemented in C.

 | Purchase |

AES for Atmel AVR Microcontrollers

For Atmel AVR Microcontrollers we offer a performance optimized software implementation of the Advanced Encryption Standard (AES).This fast implementation is based on our long lasting research on implementing cryptographic algorithms. The implementation is fully coded in assembler to guarantee optimal performance and security.

 | Purchase |

Performance-optimized AES Implementation for Renesas RL78 Microcontroller

For RL78 microcontrollers we offer a performance and code-size optimized AES implementation. The implementation is written and optimized in assembly and provides a simple interface implemented in C.

 | Purchase |

AES for Texas Instruments MSP430 Microcontrollers

 We offer a performance optimized software implementation of the Advanced Encryption Standard. This implementation is designed for the 16 bit RISC architecture of the Texas Instruments MSP430 controller family. This fast implementation is based on our experience in implementing cryptographic algorithms on microcontrollers. To achieve the best performance figures, the module is fully implemented in assembler. The module provides a C interface.

 | Purchase |

Elliptic Curve Cryptography Library for Microcontrollers

The Elliptic Curve Cryptography Library is specially crafted for embedded processors, but also suitable for general purpose 32-bit and 64-bit processors. It is based on C, comes with (constant runtime) assembly optimizations for various microcontrollers and is tested with a comprehensive set of externally generated test vectors.


print Print