Security is important to all businesses to ensure the confidentiality, integrity and authenticity of both internal and customer-facing interactions. Cryptomathic's PrimeInk Toolkits secure a wide variety of business applications ranging from secure data storage and communication, to trusted web-based forms.

    The Toolkits provide high performance and portable code, compliant with industry standard algorithms and cover cryptographic functions from low-level to more specific technologies such as digital signatures.

    PrimeInk Premium

    PrimeInk Premium offers a full range of cryptographic libraries plus full support for digital certificates and message formats. This allows standards-based integration with a wide range of third-party security products, as well as enabling signatures, authentication and encryption with third parties across open networks.

    PrimeInk Premium is an ideal toolkit for the development of applications that integrate with a Public Key Infrastructure (PKI). Full X.509 certificate handling is supported, including path discovery and validation. Standard data formats for interoperability with certificate authorities and time-stamping authorities are also included. See the technical brochure for more details.

    Example applications include:

    • Access control in open environments
    • Interoperable security solutions
    • Home banking systems
    • Internet based groupware

    PrimeInk ECC

    PrimeInk ECC provides security based on Elliptic Curve Cryptography (ECC). These advanced public key cryptographic algorithms achieve similar security to traditional algorithms but using much shorter keys. This makes computations faster and reduces storage requirements. In particular, key generation is considerably faster than traditional public key algorithms.

    These features make ECC ideal for use in performance-critical environments. In addition, ECC usage is being standardized in a variety of new applications worldwide, making PrimeInk ECC ideal for developers working within those industry sectors. See the technical brochure for details of the supported standards.

    Example applications include:

    • Performance-critical systems
    • Interoperability with other ECC systems

    PrimeInk Java

    PrimeInk Java is a signed Java Cryptography Extension (JCE) provider, which integrates seamlessly with the standard Java development environment. It provides a full set of highly optimized cryptographic algorithms.

    A complete list of the supported algorithms can be found in the technical brochure. These include hash algorithms, symmetric key encryption and decryption, computation of message authentication codes (MACs), public key encryption and decryption and the generation and validation of digital signatures.

    Example applications include:

    • Securing J2EE and EJB enterprise applications
    • Browser-based Java applets
    • Secure communication for Java applications

    PrimeInk CSP

    A Cryptographic Service Provider (CSP) is a Microsoft Windows component that offers cryptographic services such as encryption or signing and the secure storage of user keys. All CSPs are accessible via standard Microsoft interfaces, and thus integrate fully with standard Microsoft applications such as Outlook, Outlook Express and Internet Explorer, as well as third-party software such as VPN clients.

    The PrimeInk CSP provides an alternative to the standard Microsoft CSPs on Windows/x86 platforms. It offers full strength cryptographic algorithms and key protection and is digitally signed by Microsoft. In addition, the PrimeInk CSP offers the application developer full control of the user experience, regarding password policies and the dialog branding.

    Example applications include:

    • Customized secure e-mail interface
    • Customized secure web signing interface
    • Customized VPN logon

    PrimeInk Crypto Hardware Support

    Some scenarios require an extraordinary high level of physical security and/or the highest available performance. This add-on enables support for all PKCS#11 based hardware. Compatible hardware includes hardware security modules from leading manufacturers and also smart card readers and USB key tokens from all main vendors.

    Also included is a PKCS#11 interface to PrimeInk, which allows it to act as a software PKCS#11 device. This can be used in applications which have a PKCS#11 interface for cryptographic action but where no hardware PKCS#11 token is available, or during development to avoid the cost of deploying expensive cryptographic hardware on every workstation. Whether using hardware or software implementations, the PrimeInk programming interface remains the same.

    We are always ready to assist you

    It doesn't matter where you are. We can work anywhere in the world! And we would love to hear from you, be sure we will reply asap.

    Resources

    At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.