3rd Party Licenses

Crypteron uses several 3rd party libraries as listed below. Libraries are licensed for as-is use or modified at source level for better compatibility and performance with Crypteron’s products.

.NET platform

This covers Crypteron CipherCore, CipherDB, CipherStor, CipherObject and potentially additional future products. Since these libraries are popular and our customers may use different, potentially incompatible versions of the libraries, most of these libraries are included in source form. To avoid dependency and namespace conflicts, the root namespaces have also been relocated to the Crypteron root namespace for maximum compatibility.

  • Microsoft Platform Libraries – MS-LPL and MS-RSL licenses
    This includes CLR Security for FIPS-140-2 mode cryptography on Windows
  • ProtocolBuf – BSD license
  • ProtocolBuf.NET – The Apache Software License, Version 2.0
  • Avro – The Apache Software License, Version 2.0
    We use Avro and Protocol buffers for efficient machine to machine communications.
  • Newtonsoft.Json – The MIT License
  • BouncyCastle – The Legion of BouncyCastle License (adaptation of The MIT X11 License)
    Non-cryptography sub-modules are used for utility purposes while cryptographic sub-modules are used for non-FIPS 140-2 mode on Windows, Linux or Mac.
  • ValueInjecter – The MIT License

Java platform

  • com.google.guava:guava – The Apache Software License, Version 2.0
  • com.google.protobuf:protobuf-java – New BSD license
  • io.protostuff:protostuff-core – The Apache Software License, Version 2.0
  • io.protostuff:protostuff-runtime – The Apache Software License, Version 2.0
  • org.apache.avro:avro – The Apache Software License, Version 2.0
  • org.hibernate:hibernate-entitymanager – GNU Lesser General Public License
  • org.slf4j:slf4j-api – MIT License
  • ch.qos.logback:logback-classic – Eclipse Public License – v 1.0, GNU Lesser General Public License
  • com.fasterxml.jackson.core:jackson-databind – The Apache Software License, Version 2.0
  • com.h2database:h2 – MPL 2.0, and EPL 1.0
  • junit:junit – Eclipse Public License 1.0
  • org.bouncycastle:bcprov-jdk15on – Bouncy Castle Licence
  • org.codehaus.jackson:jackson-mapper-asl – The Apache Software License, Version 2.0
  • org.hamcrest:hamcrest-library – New BSD License
  • net.java.dev.jna:jna – The Apache Software License, Version 2.0
  • OpenSSL – OpenSSL License

Recent blog posts

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.