Product Licensing

CycloneCrypto is available under 3 separate licensing models:

  • Open source version (CycloneCrypto Open)
  • Evaluation version (CycloneCrypto Eval)
  • Commercial version (CycloneCrypto Lite, Pro or Ultimate)

Open Source License (GPLv2)

The open source version CycloneCrypto Open is licensed under GPL version 2. This is ideal for evaluating CycloneCrypto, for private use, or for integrating exclusively with other GPL software.


If you intend to distribute your software and link CycloneCrypto with your application, the GPL requires you to provide public and full access to all source code on a nondiscriminatory basis. If you do not wish to provide source code of your application, you must purchase a commercial license.


If you are evaluating CycloneCrypto internally, and not distributing any products containing CycloneCrypto, then you may be able to use the GPL license for this evaluation. Once complete, you may purchase a commercial license so that you can distribute your product.


You may evaluate, develop, modify, and embed CycloneCrypto in your application or product provided it is not distributed. You may copy and modify the source code provided all copies fall under the GPL license.

Evaluation License

If the GPL license cannot be considered for evaluating CycloneCrypto (because your project links to non GPL-compatible third party software), then you may consider the evaluation license CycloneCrypto Eval:

  • The software is provided in source form for a short-term evaluation only. The evaluation license expires 90 days after the date you first download the software.
  • You may use the software only for the sole purpose of internal testing and evaluation to determine whether you want license the software on a commercial basis.
  • If you plan to use this software in a commercial product, you are required to purchase a commercial license.
  • After the 90-day evaluation period, you agree to either purchase a commercial license or delete all copies of this software. If you wish to extend the evaluation period, you must contact our sales department.

Commercial License

The product is also available under a commercial license (CycloneCrypto Lite, Pro or Ultimate) for proprietary developments in a commercial context. This commercial license provides you with the following benefits:

  • The right to develop and modify the software to embed it in your products.
  • The ability to redistribute your products with the firmware.
  • The ability to keep your source code private.
  • Simple royalty-free license (one-time license fee).
  • Software maintenance for updates, upgrades and security patches.
  • Priority access to support.

Depending on your application, 3 distinct versions are available:

  • CycloneCrypto Lite includes basic algorithms only.
  • CycloneCrypto Pro includes more advanced algorithms such as CCM/GCM/XTS cipher modes.
  • CycloneCrypto Ultimate is a full-featured cryptographic library, including support for SHA-3, Chacha20Poly1305 and Elliptic-Curve Cryptography (ECC).

Feature Comparison


CycloneCrypto
Open
CycloneCrypto
Eval
CycloneCrypto
Lite
CycloneCrypto
Pro
CycloneCrypto
Ultimate
LicenseOpen sourceEvaluationCommercialCommercialCommercial
Time-limited (90 days)NoYesNoNoNo
Source codeYYYYY
Royalty freeYN/AYYY
Doxygen documentationYYYYY
PDF user's manualNOptionalYYY
Support and maintenanceNOptionalYYY

CycloneCrypto
Open
CycloneCrypto
Eval
CycloneCrypto
Lite
CycloneCrypto
Pro
CycloneCrypto
Ultimate
Base64 data encodingYYYYY
MD2, MD4 and MD5 hash functionsYYYYY
SHA-1 hash functionYYYYY
SHA-2 family hash functionsYYYYY
HMAC message-authentication codeYYYYY
RC4 stream cipherYYYYY
DES and Triple DES block cipherYYYYY
AES block cipherYYYYY
ECB, CBC, CFB, OFB and CTR cipher modesYYYYY
Diffie-Hellman key exchange (DH)YYYYY
RSA public key cryptographyYYYYY
Digital Signature Algorithm (DSA)YYYYY
Multiple precision arithmetic libraryYYYYY
Yarrow PRNGYYYYY
X.509 certificate parsingYYYYY
RIPEMD-128/160 hash functionsYYNYY
Tiger/192 hash functionYYNYY
Whirlpool hash functionYYNYY
CMAC and GMAC message-authentication codeYYNYY
RC6 block cipherYYNYY
IDEA block cipherYYNYY
Camellia block cipherYYNYY
SEED block cipherYYNYY
ARIA block cipherYYNYY
PRESENT block cipherYYNYY
XTS, CCM and GCM cipher modesYYNYY
SHA-3 family hash functionsYYNNY
BLAKE2 family hash functionsYYNNY
SHAKE128 and SHAKE256 XOFsYYNNY
Keccak sponge functionYYNNY
ChaCha encryption algorithmYYNNY
Poly1305 message authenticationYYNNY
ChaCha20Poly1305 AEADYYNNY
PKCS #5YYNNY
Elliptic Curve Cryptography (ECC)YYNNY
Elliptic Curve Diffie-Hellman (ECDH)YYNNY
Elliptic Curve DSA (ECDSA)YYNNY
NIST-P elliptic curvesYYNNY
Brainpool elliptic curvesYYNNY
Curve25519 and Curve448 curvesYYNNY
EdDSA signature (Ed25519 and Ed448)YYNNY