101010101100100101101001101110010101011010101010
CRYPTSOFT is a privately held Australian company that operates worldwide in the enterprise key management security market. Cryptsoft’s Key Management Interoperability Protocol (KMIP) software development kits (SDKs) are the market’s preferred OEM solutions. Cryptsoft’s solutions have been selected by prominent global companies for interoperable enterprise key management and encryption technology in their storage, security and cloud products. Cryptsoft is an OASIS Sponsor, SNIA and SSIF Voting Member. http://www.cryptsoft.com/
CRYPTSOFT’S valued customers include:
101010101100100101101001101110010101011010101010
Key Management SDKsComplete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
Cryptsoft’s Key Management SDKs enable rapid addition of interoperable key management functionality to your existing products.
Providing both Client and Server SDKs, Cryptsoft KMIP SDKs have been integrated into the majority of all KMIP products on the market today, eliminating the need for rework to interact with another vendor’s endpoint.
As the security market’s preferred KMIP vendor, Cryptsoft has the technology and the relationships to ensure your product delivers its maximum potential.
Using the Cryptsoft SDKs in ANSI C you can support existing non-KMIP key management protocols with a single, consistent interface and provide your customers with a complete vendor-independent key management solution, often without replacing existing end points.
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Guaranteed interoperability With all released KMIP products• Cross-Language Support Clients in C, Java, C-Sharp, and Python
Servers in C and Java
KEY
MAN
AGEM
ENT
KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL
Clients
Servers
101010101100100101101001101110010101011010101010
KMIP Interoperability Test SuiteComplete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
101010101100100101101001101110010101011010101010
Key Management SDKsComplete vendor-independent key management solution
Client SDK Products Server SDK Products• KMIP C Client SDK• KMIP Java Client SDK• KMIP C-Sharp Client SDK• KMIP Python Client SDK• KMIP C Client Layered Protocol SDKs for Proprietary Protocols• KMIP Adapters (Oracle TDE & Microsoft BitLocker)• KXUC C Interoperability Test Suite• KXUC Java Interoperability Test Suite• KXUC Web Interoperability Test Suite• KXUC Cloud Online Test Service
Features• Comprehensive example code• Source licence option• Supports KMIP v1.0, v1.1, v1.2, and v1.3 (committee draft)
• Supports proprietary key management protocols (optional plugins to C SDK)
Supported Databases• Oracle MySQL• Oracle Database• Microsoft SQL Server• SQLite
• IBM DB2• PostgreSQL• Embedded (lightweight)
Supported Hardware Security Modules and Random Number Generators
• Android [OATH-TOTP] [Soft Token]• Cryptsoft [OATH-TOTP]• Feitian [OATH-HOTP/TOTP] • Apple [OATH-TOTP] [Soft Token]
• SafeNet - Luna CA (RNG/HSM) [PKCS#11]• SafeNet - Luna PCI (RNG/HSM) [PKCS#11]• SafeNet - Protect Server (RNG/HSM) [PKCS#11]• Thales e-Security - nShield Connect (RNG/HSM) [PKCS#11]• Thales e-Security - nShield Edge (RNG/HSM) [PKCS#11]• Thales e-Security - nShield Solo (RNG/HSM) [PKCS#11]
Supported One Time Password Devices
• ID Quantique - Quantis USB (RNG) [Vendor]• ID Quantique - Quantis PCI (RNG) [Vendor]• ID Quantique - Quantis PCIe (RNG) [Vendor]• Feitian - ePass [PKCS#11]• Oracle - SCA6000 [PKCS#11]• SafeNet - Luna SA4/SA5 (RNG/HSM) [PKCS#11]
• Mi-Token [OATH-TOTP] [Soft Token]• RSA Security SecurID [SecurID]• Litheware Tombé [OATH-HOTP] [YubiKey]• Yubico [OATH-HOTP/TOTP] [YubiKey]
• KMIP C Server SDK• KMIP Java Server SDK• KMIP Alert Server SDK• KMIP Server VM Subscription (Annual)• KMIP Server Administration Interface• KMIP C Proxy Servers for Proprietary Protocols• KMIP C Server Integration Modules (PKCS#11, HSM, RNG)• KMIP C Server OTP Server Modules
101010101100100101101001101110010101011010101010
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
Complete vendor-independent key management solutionKMIP C Client SDK
Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.
Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.
From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Guaranteed interoperability With all released KMIP server products• Extensive range of supported platforms Custom platform ports on request• Available as a binary SDK Source license option• Comprehensive example code Custom examples available - rapid integration• Supported on over 35 different platforms Including Linux, Windows, Embedded http://www.cryptsoft.com/platforms/
KEY
MAN
AGEM
ENT
KMIP Client SDK KMIP Server SDK
KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL
101010101100100101101001101110010101011010101010
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
Complete vendor-independent key management solutionKMIP C Client SDK
KMIP C Client Examples
Supported KMIP Profiles
Supported KMIP Operations
Supported KMIP Servers
KMIP Object Types Supported Cryptographic Providers
• Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML• Simple Servers Query, Notify, Put• Simple Clients Locate Objects, Create and Return Objects • Locating Managed Objects Simple, Extended, IBM TKLM/SKLM• KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair1.1, Archive, Recover, Activate• Creating Keys Simple, Advanced, Extensions
• Advanced Cryptographic Client1.2
• Advanced Symmetric Key Foundry Client • Asymmetric Key Lifecycle Client• Baseline Client Basic• Baseline Client TLS v1.2• Basic Cryptographic Client1.2
• Activate• Add Attribute• Archive• Cancel• Certify• Check• Create
• Certificate• Opaque Object• PGP Key
• OpenSSL 1.0.x• OpenSSL FIPS 2.0
• RSA BSAFE MES 3.x, 4.x (option)• RSA BSAFE Share-C (option)• OpenSSL 0.9.8 (option)
• Private Key• Public Key • Secret Key
• Split Key • Symmetric Key• Template
• Create Key Pair• Create Split Key1.2
• Decrypt1.2
• Delete Attribute• Derive Key• Destroy• Discover Versions1.1
• Encrypt1.2
• Get• Get Attribute List• Get Attributes• Get Usage Allocation• Hash1.2
• Join Split Key1.2
• Locate• MAC1.2
• MAC Verify1.2
• Modify Attribute• Notify• Obtain Lease• Poll
• Put • Register• Register Query• Re-certify• Recover• Re-key• Re-key Key Pair1.1
• Revoke • RNG Retrieve1.2
• RNG Seed1.2
• Sign1.2
• Signature Verify1.2
• Validate
• Managing Attributes Add, Modify, Delete Attribute• Linear Tape Open (LTO) LTO-4 Key Management, LTO-5/6 Key Management, KAD, AKAD, UKAD naming, Generic LTO-4• Random Number Generator (RNG)1.2
Retrieve Server RNG, Seed Server RNG• Server Cryptographic Operations1.2
Encrypt, Decrypt, Sign, Signature Verify MAC, MAC Verify, Hash• Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3
• Basic Symmetric Key Foundry Client• HTTPS Client• Intermediate Symmetric Key Foundry Client• JSON Client• Opaque Managed Object Store Client• RNG Cryptographic Client1.2
• Split Key (Multi-Party Controls)1.2
Create Split Key, Join Split Key• Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete• Generic Multi-protocol Key Handling Get Key, Put Key, Del Key Request/Response Handling Recording, Replaying, Batching• Client Credential Handling Password-protected TLS Credentials Device Credentials, IBM TKLM/SKLM
• Storage Array With SED Client• Suite-B MinLOS_128 Client• Suite-B MinLOS_192 Client• Symmetric Key Lifecycle Client• Tape Library Client• XML Client
101010101100100101101001101110010101011010101010
Complete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
KMIP Java Client SDK
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Guaranteed interoperability With all released KMIP server products• Available as a binary SDK Source license option• Comprehensive example code Custom examples available - rapid integration
KEY
MAN
AGEM
ENT
Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.
Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.
From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.
KMIP Client SDK KMIP Server SDK
KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL
101010101100100101101001101110010101011010101010
Complete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
KMIP Java Client SDK
KMIP Java Client Examples• KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key KeyPair 1.1, Archive, Recover, Activate, Derive Key• Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3 • Creating Keys Simple, Advanced, Extensions
KMIP Object Types Cryptographic Providers Encodings• Certificate• Opaque Object• PGP Key
• Sun/Oracle JCE• IBM JCE• RSA BSAFE Crypto-J• Bouncy Castle JCE
• Private Key• Public Key • Secret Key
• Split Key • Symmetric Key• Template
• TTLV• HTTPS/TTLV• HTTPS/JSON• HTTPS/XML
Supported KMIP Operations• Activate• Add Attribute• Archive• Cancel• Certify• Check• Create
• Create Key Pair• Create Split Key1.2
• Decrypt1.2
• Delete Attribute• Derive Key• Destroy• Discover Versions1.1
• Encrypt1.2
• Get• Get Attribute List• Get Attributes• Get Usage Allocation• Hash1.2
• Join Split Key1.2
• Locate• MAC1.2
• MAC Verify1.2
• Modify Attribute• Notify• Obtain Lease• Poll
• Put • Register• Register Query• Re-certify• Recover• Re-key• Re-key Key Pair1.1
• Revoke • RNG Retrieve1.2
• RNG Seed1.2
• Sign1.2
• Signature Verify1.2
• Validate
• Managing Attributes Add, Modify, Delete Attribute• Random Number Generator (RNG)1.2
Retrieve Server RNG, Seed Server RNG• Server Cryptographic Operations1.2
Encrypt, Decrypt, MAC, MAC Verify, Hash• Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML• Simple Servers Query, Notify, Put• Locating Managed Objects Simple, Extended, XML
• Simple Clients Locate Objects, Create and Return • Objects Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete• Request/Response Handling Replay, Batching• JCE Examples Key Store Provider
Supported KMIP Profiles• Advanced Cryptographic Client1.2
• Advanced Symmetric Key Foundry Client • Asymmetric Key Lifecycle Client• Baseline Client Basic• Baseline Client TLS v1.2• Basic Cryptographic Client1.2
• Basic Symmetric Key Foundry Client• HTTPS Client• Intermediate Symmetric Key Foundry Client• JSON Client• Opaque Managed Object Store Client• RNG Cryptographic Client1.2
• Storage Array With SED Client• Suite-B MinLOS_128 Client• Suite-B MinLOS_192 Client• Symmetric Key Lifecycle Client• Tape Library Client• XML Client
Supported KMIP Servers
101010101100100101101001101110010101011010101010
Complete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
KMIP C Server SDK
KEY
MAN
AGEM
ENT
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Guaranteed interoperability With all released KMIP server products• Extensive range of supported platforms Custom platform ports on request• Available as a binary SDK Source license option• Comprehensive example code Custom examples available - rapid integration• Supported on over 35 different platforms Including Linux, Windows, Embedded http://www.cryptsoft.com/platforms/
Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.
Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.
From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.
KMIP Client SDK KMIP Server SDK
KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL
101010101100100101101001101110010101011010101010
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
Complete vendor-independent key management solution`
KMIP C Server SDK
KMIP C Server Examples
Supported KMIP Profiles
Supported KMIP Clients
Supported Databases Cryptographic Providers Supported Encodings
• Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML• Simple Clients Operations Locate Objects, Create and Return Objects • Locating Managed Objects Simple, Extended, IBM TKLM/SKLM• KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair 1.1, Archive, Recover, Activate• Server Cryptographic Operations1.2
Encrypt, Decrypt, Sign, Signature Verify MAC, MAC Verify, Hash
• Advanced Cryptographic Server1.2
• Advanced Symmetric Key Foundry Server • Asymmetric Key Lifecycle Server• Baseline Server Basic• Baseline Server TLS v1.2• Basic Cryptographic Server1.2
• SQLite3• MySQL 5.x• Oracle 11.x, 12.x
• OpenSSL 1.0.x• OpenSSL 0.9.8 (option)• OpenSSL FIPS 2.0
• SQL Server 2003+• IBM DB2 9 & 10• PostgreSQL 8 & 9
• TTLV• HTTPS/TTLV
• HTTPS/JSON• HTTPS/XML
Supported KMIP Operations• Activate• Add Attribute• Archive• Cancel• Certify• Check• Create
• Create Key Pair• Create Split Key1.2
• Decrypt1.2
• Delete Attribute• Destroy• Discover Versions1.1
• Encrypt1.2
• Get• Get Attribute List• Get Attributes• Get Usage Allocation• Hash1.2
• Join Split Key1.2
• Locate
• MAC1.2
• MAC Verify1.2
• Modify Attribute• Notify• Obtain Lease• Poll• Put
• Register• Register Query• Re-certify• Recover• Re-Key• Re-key Key Pair1.1
• Revoke
• RNG Retrieve1.2
• RNG Seed1.2
• Sign1.2
• Signature Verify1.2
• Validate
• Managing Attributes Add, Modify, Delete Attribute• Random Number Generator (RNG)1.2
Retrieve Server RNG, Seed Server RNG• Split Key (Multi-Party Controls)1.2
Create Split Key, Join Split Key• Creating Keys Simple, Advanced, Extensions• Determine Capabilities Server SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3
• Basic Symmetric Key Foundry Server• HTTPS Server• Intermediate Symmetric Key Foundry Server• JSON Server• Opaque Managed Object Store Server• RNG Cryptographic Server1.2
• Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete• Request/Response Handling Recording, Replaying, Batching, Bulk Data Loading• Administration Create, Modify, Delete Users, Partitions, Groups Manage Group Privileges Serialise, Deserialise Managed Objects• Database Schema Management and Migration Fixture Loading, SQL Replay
• Storage Array With SED Server• Suite-B MinLOS_128 Server• Suite-B MinLOS_192 Server• Symmetric Key Lifecycle Server• Tape Library Server• XML Server
101010101100100101101001101110010101011010101010
Complete vendor-independent key management solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
KMIP Java Server SDK
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Guaranteed interoperability With all released KMIP server products• Extensive range of supported platforms Custom platform ports on request• Available as a binary SDK Source license option• Comprehensive example code Custom examples available - rapid integration
KEY
MAN
AGEM
ENT
Cryptsoft’s Key Management Interoperability Protocol (KMIP) SDKs let you rapidly add interoperable, standards-based, enterprise key management capability to your existing applications.
Reduce time to market, KMIP-enable your solution within days, not months, using our comprehensive collection of example code provided by the market leader in key management SDKs.
From specialised embedded systems through to scalable, whole of enterprise solutions, your KMIP SDK license is backed by a global support network, offering a total key management solution.
KMIP Client SDK KMIP Server SDK
KMIP KEY MANAGEMENTINTEROPERABILITY PROTOCOL
101010101100100101101001101110010101011010101010
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
Complete vendor-independent key management solutionKMIP Java Server SDK
KMIP Java Server Examples
Supported KMIP Profiles
Supported KMIP Clients
Supported Databases Cryptographic Providers Supported Encodings
• Simple Protocol Format Parsing TTLV, HEX, BIN, JSON, XML• KMIP Standard Operations Create, Register, Destroy, Get, Get Attribute List, Get Attributes, Create Key Pair, Re-key, Re-key Key Pair 1.1, Archive, Recover, Activate, Derive Key• Administration Create, Modify, Delete Users, Partitions, Groups Manage Group Privileges Serialise, Deserialise Managed Objects• Server Cryptographic Operations1.2
Encrypt, Decrypt, MAC, MAC Verify, Hash
• Advanced Cryptographic Server1.2
• Advanced Symmetric Key Foundry Server • Asymmetric Key Lifecycle Server• Baseline Server Basic• Baseline Server TLS v1.2• Basic Cryptographic Server1.2
• HSQLDB• SQLite3• MySQL 5.x• Oracle 11.x, 12.x
• Sun/Oracle JCE• IBM JCE• RSA BSAFE Crypto-J• Bouncy Castle JCE
• SQL Server 2003+• IBM DB2 9 & 10• PostgreSQL 8 & 9
• TTLV• HTTPS/TTLV
• HTTPS/JSON• HTTPS/XML
Supported KMIP Operations• Activate• Add Attribute• Archive• Cancel• Certify• Check• Create
• Create Key Pair• Decrypt1.2
• Delete Attribute• Derive Key• Destroy• Discover Versions1.1
• Encrypt1.2
• Get• Get Attribute List• Get Attributes• Get Usage Allocation• Hash1.2
• Locate• MAC1.2
• MAC Verify1.2
• Modify Attribute• Notify• Obtain Lease• Poll• Put • Register
• Register Query• Re-certify• Recover• Re-key• Re-key Key Pair1.1
• Revoke • RNG Retrieve1.2
• RNG Seed1.2
• Validate
• Creating Keys Simple, Advanced, Extensions• Managing Attributes Add, Modify, Delete Attribute• Random Number Generator (RNG)1.2
Retrieve Server RNG, Seed Server RNG• Determine Capabilities Client SDK Version, Discover Protocol Versions1.1, Query Server Basic , Query Server Extensions1.1, Query Advanced Capabilities1.3 • Request/Response Handling Replay, Batching
• Basic Symmetric Key Foundry Server• HTTPS Server• Intermediate Symmetric Key Foundry Server• JSON Server• Opaque Managed Object Store Server• RNG Cryptographic Server1.2
• JCE Examples Key Store Provider• Cryptsoft Vendor Extensions SQL Insert, SQL Update, SQL Delete• Database Schema Management and Migration Fixture Loading• Simple Servers Query, Notify, Put• Simple Clients Locate Objects, Create and Return Objects • Locating Managed Objects Simple, Extended, XML
• Storage Array With SED Server• Suite-B MinLOS_128 Server• Suite-B MinLOS_192 Server• Symmetric Key Lifecycle Server• Tape Library Server• XML Server
101010101100100101101001101110010101011010101010
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
All trademarks, service marks, trade names, product names and logos are property of their respective owners.
Complete verification solutionKMIP Interoperability Test Suite
Cryptsoft’s Key Management Interoperability Protocol Test Suites (KXUC) let you rapidly confirm the interoperability status of your product.
Reduce time to market and release with the confidence provided by data driven testing.
Backed by a global support network, Cryptsoft’s KMIP SDKs offer a total key management solution.
Key Features• Full OASIS KMIP compliance Versions: 1.0, 1.1, 1.2, 1.3* (committee draft)• Available as a binary SDK or as a service Source license option• Comprehensive test cases KMIP Test Cases and KMIP Profile Test Cases
DefineTransform
ExecuteAnalyse
KXUC C
KXUC Java
KXUC Web
KXUC Cloud
Test Report
SKFF-M-1-101
SKFF-M-2-10
SKFF-M-3-10
SKFF-M-4-10
SKFF-M-5-10
SKFF-M-6-10
SKFF-M-7-10
SKFF-M-8-10
SKFF-M-9-10
SKFF-M-10-10
2
3
4
5
6
7
8
9
10
15%
25%
5%
12%
15%
20%
18%
5%
20%
10%
--
--
--
--
--
--
--
--
--
--
Test ID % &#
KMIP TEST CASES KMIP PROFILES
KEY
MAN
AGEM
ENT
101010101100100101101001101110010101011010101010
KMIP Interoperability Test SuiteComplete verification solution
sales [email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362
@CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
• TC-311-11• TC-312-11• TC-313-11• TC-314-11• TC-315-11• TC-32-11• TC-41-11• TC-51-11• TC-61-11• TC-71-11• TC-72-11• TC-81-11• TC-82-11• TC-91-11• TC-92-11• TC-93-11
• TC-94-11• TC-95-11• TC-101-11• TC-111-11• TC-112-11• TC-121-11• TC-122-11• TC-131-11• TC-132-11• TC-133-11• TC-134-11• TC-141-11• TC-142-11• TC-151-11• TC-152-11• TC-161-11
• TC-171-11• TC-181-11• TC-182-11• TC-NP-1-11• TC-NP-2-11• TC-ECC-1-11• TC-ECC-2-11• TC-ECC-3-11• SKFF-M-1-11• SKFF-M-2-11• SKFF-M-3-11• SKFF-M-4-11• SKFF-M-5-11• SKFF-M-6-11• SKFF-M-7-11• SKFF-M-8-11
• SKFF-M-9-11• SKFF-M-10-11• SKFF-M-11-11• SKFF-M-12-11• SKFF-O-1-11• SKFF-O-2-11• SKFF-O-3-11• SKFF-O-4-11• SKFF-O-5-11• SKFF-O-6-11• SKLC-M-1-11• SKLC-M-2-11• SKLC-M-3-11• SKLC-O-1-11• AKLC-M-1-11• AKLC-M-2-11
• AKLC-M-3-11• AKLC-O-1-11• OMOS-M-1-11• OMOS-O-1-11• SASED-M-1-11• SASED-M-2-11• SASED-M-3-11• TL-M-1-11• TL-M-2-11• TL-M-3-11• MSGENC-HTTPS-M-1-11• MSGENC-JSON-M-1-11• MSGENC-XML-M-1-11• SUITEB-128-M-1-11• SUITEB-192-M-1-11
• TC-311-12• TC-312-12• TC-313-12• TC-314-12• TC-315-12• TC-32-12• TC-41-12• TC-51-12• TC-61-12• TC-71-12• TC-72-12• TC-81-12• TC-82-12• TC-91-12• TC-92-12• TC-93-12• TC-94-12• TC-95-12• TC-101-12• TC-111-12• TC-112-12• TC-121-12• TC-122-12
• TC-131-12• TC-132-12• TC-133-12• TC-134-12• TC-141-12• TC-142-12• TC-151-12• TC-152-12• TC-161-12• TC-171-12• TC-181-12• TC-182-12• TC-NP-1-12• TC-NP-2-12• TC-ECC-1-12• TC-ECC-2-12• TC-ECC-3-12• TC-PGP-1-12• TC-MDO-1-12• TC-MDO-2-12• TC-MDO-3-12• TC-SJ-1-12• TC-SJ-2-12
• TC-SJ-3-12• TC-SJ-4-12• SKFF-M-1-12• SKFF-M-2-12• SKFF-M-3-12• SKFF-M-4-12• SKFF-M-5-12• SKFF-M-6-12• SKFF-M-7-12• SKFF-M-8-12• SKFF-M-9-12• SKFF-M-10-12• SKFF-M-11-12• SKFF-M-12-12• SKFF-O-1-12• SKFF-O-2-12• SKFF-O-3-12• SKFF-O-4-12• SKFF-O-5-12• SKFF-O-6-12• SKLC-M-1-12• SKLC-M-2-12• SKLC-M-3-12
• SKLC-O-1-12• AKLC-M-1-12• AKLC-M-2-12• AKLC-M-3-12• AKLC-O-1-12• OMOS-M-1-12• OMOS-O-1-12• SASED-M-1-12• SASED-M-2-12• SASED-M-3-12• TL-M-1-12• TL-M-2-12• TL-M-3-12• MSGENC-HTTPS-M-1-12• MSGENC-JSON-M-1-12• MSGENC-XML-M-1-12• SUITEB-128-M-1-12• SUITEB-192-M-1-12• CS-BC-M-1-12• CS-BC-M-2-12• CS-BC-M-3-12• CS-BC-M-4-12• CS-BC-M-5-12
• CS-BC-M-7-12• CS-BC-M-8-12• CS-BC-M-9-12• CS-BC-M-10-12• CS-BC-M-11-12• CS-BC-M-12-12• CS-BC-M-13-12• CS-BC-M-14-12• CS-RNG-M-1-12• CS-RNG-O-1-12• CS-RNG-O-2-12• CS-RNG-O-3-12• CS-RNG-O-4-12• CS-AC-M-1-12• CS-AC-M-2-12• CS-AC-M-3-12• CS-AC-M-4-12• CS-AC-M-5-12• CS-AC-M-6-12• CS-AC-M-7-12• CS-AC-M-8-12
• TC-CREG-2-13• TC-OFFSET-1-13• TC-OFFSET-2-13• TC-OTP-1-13• TC-OTP-2-13
• TC-OTP-3-13• TC-Q-CAP-2-13• TC-Q-CREG-1-13• TC-Q-PROF-2-13• TC-Q-RNGS-2-13
• TC-Q-VAL-1-13• TC-Q-S2C-1-13• TC-Q-S2C-2-13• TC-Q-S2C-PROF-2-13• TC-STREAM-HASH-1-13
• TC-STREAM-HASH-3-13• TC-RNG-ATTR-1-13• TC-RNG-ATTR-2-13• TC-STREAM-ENC-1-13• TC-STREAM-ENC-2-13
• TC-STREAM-ENCDEC-1-13
KMIP v1.0
KMIP v1.1
KMIP v1.2
KMIP v1.3
• TC-311-10• TC-312-10• TC-313-10• TC-314-10• TC-315-10• TC-32-10• TC-41-10• TC-51-10• TC-61-10• TC-71-10• TC-72-10• TC-81-10• TC-82-10• TC-91-10
• TC-92-10• TC-93-10• TC-94-10• TC-95-10• TC-101-10• TC-111-10• TC-121-10• TC-131-10• TC-132-10• TC-134-10• TC-NP-1-10• TC-NP-2-10• TC-ECC-1-10• TC-ECC-2-10
• TC-ECC-3-10• SKFF-M-1-10• SKFF-M-2-10• SKFF-M-3-10• SKFF-M-4-10• SKFF-M-5-10• SKFF-M-6-10• SKFF-M-7-10• SKFF-M-8-10• SKFF-M-9-10• SKFF-M-10-10• SKFF-M-11-10• SKFF-M-12-10• SKFF-O-1-10
• SKFF-O-2-10• SKFF-O-3-10• SKFF-O-4-10• SKFF-O-5-10• SKFF-O-6-10• SKLC-M-1-10• SKLC-M-2-10• SKLC-M-3-10• SKLC-O-1-10• AKLC-M-1-10• AKLC-M-2-10• AKLC-M-3-10• AKLC-O-1-10• OMOS-M-1-10
• SASED-M-1-10• SASED-M-2-10• SASED-M-3-10• TL-M-1-10• TL-M-2-10• TL-M-3-10• MSGENC-HTTPS-M-1-10• MSGENC-JSON-M-1-10• MSGENC-XML-M-1-10• SUITEB-128-M-1-10• SUITEB-192-M-1-10
The Cryptsoft Quality Management System is certified to ISO 9001:2008
Cryptsoft is an OASIS Sponsor and an active member and contributor to the KMIP and PKCS#11 technical committees
Cryptsoft is voting member of the Storage Networking Industry Association (SNIA) and the Storage Security Industry Forum (SSIF)
CRYPTSOFT CRYPTSOFT-SECURITY-SPECIALISTS@CRYPTSOFT
101010101100100101101001101110010101011010101010
Copyright © 2015 Cryptsoft Pty Ltd. All rights reserved.All trademarks, service marks, trade names, product names and logos are property of their respective owners.
[email protected] WWW.CRYPTSOFT.COM+61 7 3103 0321 | US +1 650 918 4362