Release Notes

Crypteron Security Release Notes


  • Improved key distribution performance in highly concurrent environments (increase fulfillment rates from cache, increased fulfillment rates from already in-flight connections etc)
  • Improved reliability of health and license checks


Cumulative notes for 2019

  • Support for Entity Framework 6.3 on .NET Core 3
  • Support for Entity Framework Core 2.2
  • Support for Entity Framework Core 3.0
  • CipherObject now exposes Encrypt() and Decrypt() method instead of Seal() and Unseal() based on customer feedback
  • Reduced network retries to 3 (from 5) and increased back-offs to 300 ms, 1 second and 5 seconds
  • Slimmed down dependencies on .NET based off updated to .NET Core and .NET Standard
  • Optimized caching of keys
  • Multiple caching options based on run-time environment
  • License checks are asynchronous and as a non-blocking background task to avoid client delays
  • Removed certificate based license validation
  • Updated Nuget package descriptions and icon
  • CipherStor now has progress event hooks
  • NHibernate is no longer supported


  • Internal improvements to allow CipherObject and CipherStor to run directly in SQL Server itself via CLR runtime support. This enables many use-cases where a web-application is using Crypteron’s CipherObject or CipherDB to protect data but other tools like SSRS or SQL Stored Procedures also need access to protected data.


  • CipherObject and CipherStor C# agents now support Linux and Mac through .NET Core (specifically by supporting .NET Standard 2.0)
  • Major code-cleanup and various improvements across the board
  • Network re-try performance improvements
  • Allowed customization of Crypteron debug log files
  • CipherDB support for Entity Framework 5 and NHibernate3 deprecated (end-of-life)


  • New feature: Data masking
  • Deprecated v1 Headers from 2015 release
  • Improved agent version reporting when performing a license request
  • CipherStor now defaults to creating additional data-encryption-keys upon every encryption operation
  • Key and license requests now default to TLS 1.2 for outermost encryption layer
  • CipherStor now removed dependencies on Azure Storage libraries and remove Azure specific APIs. Customers are advised to use CipherStor’s general purpose streaming interface which support any cloud provider, any storage solution.
  • Fixed issue with incorrect loading of an enterprise license


  • Crypteron enterprise tools updated
  • Client side caching of keys is now programmable via `keyCacheDuration` value inside `commonConfig` configuration item


  • New feature: Searchable encryption
  • Fixed error in CipherStor if reportOnBytes is 0
  • Miscellaneous improvements


  • CipherCore (i.e. all agent flavors)
    • Simplified the ability to program the AppSecret based on customer feedback
    • Added doxygen documentation
    • Internally moved to Avro 1.8.1
    • Getting ready for version 3 of crypto-headers (supporting deterministic encryption, crypto-agility, fine grained distributed media encryption keys etc.)
    • Better decoupling of license checks across API and agents


  • CipherCore (i.e. all agent flavors)
    • REST APIs now have appropriate retries and backoffs
    • Network API latency estimate monitoring to optimize backoff and retry logic
    • Enterprise customers can specify their own Crypteron API server URLs
    • Enabled setting of certain configuration items (in app/web.config) to be specific via code
    • If multiple threads request the same REST resource, requests are coalesced into a single network request (i.e. the currently in-flight request)
    • Miscellaneous code cleanup per C# v6.0
    • NuGet install/uninstall scripts will update .config files in a cleaner manner
    • Updated license verification checks


  • CipherStor
    • Added Stream to Stream API for greater flexibility across any cloud platform and storage solutions
    • Added ability to cancel long streaming operations. Note that destination will be aborted and left an in unknown state.


  • CipherObject released!


Breaking changes

  • Simplified namespace for Crypteron configuration inside .config files (details)


  • First NuGet based release!
  • Release notes published online based on feedback
  • Added ability to Seal/Unseal standard C# objects

Recent blog posts

Migrating existing live data into Crypteron

You’re already live in production. And you have sensitive in the clear. Read this article to see how Crypteron can help.

Encryption, Entity Framework and Projections

Projections in Entity Framework live outside the entity lifecycle. Read more to learn how your can use Crypteron to secure such data.

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.