Bouncy Castle (cryptography)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
Bouncy Castle
Developer(s) Legion of the Bouncy Castle Inc.
Stable release(s) [±]
Java 1.58 / August 18, 2017; 32 days ago (2017-08-18)[1]
Java FIPS BC-FJA 1.0.0 / November 11, 2016; 10 months ago (2016-11-11)[2]
C# 1.8.1 / December 28, 2015; 20 months ago (2015-12-28)[3]
C# FIPS BC-FNA 1.0.1 / December 28, 2016; 8 months ago (2016-12-28)[4]
Repository github.com/bcgit/
Written in C# and Java
Platform .NET Framework and Java SE
Type Cryptography API
License MIT License[5]
Website bouncycastle.org

Bouncy Castle is a collection of APIs used in cryptography. It includes APIs for both the Java and the C# programming languages. The APIs are supported by a registered Australian charitable organization: Legion of the Bouncy Castle Inc.

Bouncy Castle is Australian in origin and therefore American restrictions on the export of cryptography from the United States do not apply to it.

History[edit]

Bouncy Castle started when two colleagues were tired of having to re-invent a set of cryptography libraries each time they changed jobs working in server-side Java SE. One of the developers was active in Java ME (J2ME at that time) development as a hobby and a design consideration was to include the greatest range of Java VMs for the library, including those on J2ME. This design consideration led to the architecture that exists in Bouncy Castle.[6]

The project was founded in May 2000. It was originally just Java. C# API added in 2004.

The original Java API consisted of approximately 27,000 lines of code, including test code and provided support for J2ME, a JCE/JCA provider, and basic X.509 certificate generation. In comparison, the 1.53 release consists of 390,640 lines of code, including test code. It supports the same functionality as the original release with a larger number of algorithms, plus PKCS#10, PKCS#12, CMS, S/MIME, OpenPGP, DTLS, TLS, OCSP, TSP, CMP, CRMF, DVCS, DANE, EST and Attribute Certificates. The C# API is around 145,000 lines of code and supports most of what the Java API does.

Some key properties of the project are:

  • Strong emphasis on standards compliance and adaptability.
  • Public support facilities include an issue tracker, dev mailing list and a wiki all available at the website.
  • Commercial support provided under resources for the relevant API listed on the Bouncy Castle website

On 18 October 2013, a not-for-profit association, the Legion of the Bouncy Castle Inc. was established in the state of Victoria, Australia, by the core developers and others to take ownership of the project and support the ongoing development of the APIs. The association was recognised as an Australian charity with a purpose of advancement in education and a purpose that is beneficial to the community by the Australian Charities and Not-For-Profits Commission on 7 November 2013[7]. The association was authorised to fundraise to support its purposes on 29 November 2013 by Consumer Affairs Victoria.

Architecture[edit]

The Bouncy Castle architecture consists of two main components that support the base cryptographic capabilities. These are known as the 'light-weight' API, and the Java Cryptography Extension (JCE) provider. Further components built upon the JCE provider support additional functionality, such as PGP support, S/MIME, etc.

The low-level, or 'light-weight', API is a set of APIs that implement all the underlying cryptographic algorithms. The APIs were designed to be simple enough to use if needed, but provided the basic building blocks for the JCE provider. The intent is to use the low-level API in memory constrained devices (JavaME) or when easy access to the JCE libraries is not possible (such as distribution in an applet). As the light-weight API is just Java code, the Java virtual machine (JVM) does not impose any restrictions on the operation of the code, and at early times of the Bouncy Castle history it was the only way to develop strong cryptography that was not crippled by the Jurisdiction Policy files that prevented JCE providers from performing "strong" encryption.

The JCE-compatible provider is built upon the low-level APIs. As such, the source code for the JCE provider is an example of how to implement many of the "common" crypto problems using the low-level API. Many projects have been built using the JCE provider, including an Open Source Certificate Authority EJBCA.

Certified releases[edit]

The C# and Java releases now have FIPS 140-2 Level 1 certified streams as well. These differ from the regular releases in that, while the modules are designed in a similar fashion to the regular releases, the low-level APIs are quite different – largely to support the enforcement of controls that FIPS requires on algorithm use. In the case of the JCE level of the Java API the provider is still largely a drop replacement for the regular release. The first FIPS certified releases were made available in November 2016, with the Java version being assigned certification number 2768 and the C# version being assigned certification number 2792.

Spongy Castle[edit]

The Android operating system, as of early 2014, includes a customized version of Bouncy Castle.[8] Due to class name conflicts, this prevents Android applications from including and using the official release of Bouncy Castle as-is. A third-party project called Spongy Castle distributes a renamed version of the library to work around this issue.[9]

See also[edit]

References[edit]

  1. ^ "Latest Java Releases - bouncycastle.org". 2017-08-18. Retrieved 2017-08-28. 
  2. ^ "Java FIPS Resources - bouncycastle.org". 2016-11-11. Retrieved 2017-08-28. 
  3. ^ "The Legion of the Bouncy Castle C# Cryptography APIs". 2015-12-28. Retrieved 2015-12-29. 
  4. ^ "C# .NET FIPS Resources - bouncycastle.org". 2016-11-11. Retrieved 2017-08-28. 
  5. ^ "Bouncy Castle - LICENSE". bouncycastle.org. Legion of the Bouncy Castle. 
  6. ^ "Open Source Development and Sustainability: A Look at the Bouncy Castle Project" (PDF). Linux Foundation Collaboration Summit, 2016. Retrieved 29 August 2017. 
  7. ^ "Australian Charities and Not-For-Profits Commission Register". Retrieved 28 August 2017. 
  8. ^ Schneider, Reimer Pohlmann (17 October 2014). ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference. Springer. p. 205. 
  9. ^ "Spongy Castle". Retrieved 29 April 2013 – via Github. 

External links[edit]

  • Official website
  • Green, Roedy. "Bouncy Castle". Java Glossary. Mindprod. 
  • kpbe An open source Password Based Encryption tool for files that uses Bouncy Castle C# implementation
  • JCrypTool (JCT) is a widespread open source e-learning tool illustrating more than 100 cryptographic and cryptanalytic concepts. It uses the Bouncy Castle Java implementation. JCT is built with Java/Eclipse/RCP/SWT and runs on Windows, MacOS, and Linux. See CrypTool.