CycloneCRYPTO Commercial License

For proprietary developments

CycloneCRYPTO is available under 3 different commercial license categories for proprietary developments in a commercial context.

Lite

CycloneCRYPTO Lite includes basic symmetric cryptography (cipher, hash and MAC algorithms).

Pro

CycloneCRYPTO Pro adds support for asymmetric cryptography (RSA, DSA, Diffie-Hellman, ECDH, ECDSA), AEAD cipher modes (GCM and CCM) and X.509 certificate parsing.

Ultimate

CycloneCRYPTO Ultimate Ultimate supports the most advanced cryptographic algorithms from Daniel J. Bernstein (EdDSA, X25519, X448, ChaCha20Poly1305), SHA-3 and X.509 certificate generation

SVG Arrow

Detailed feature breakdown
Choose the components that fit to your project!


Matrix Comparison

CycloneCRYPTO Commercial Editions

EDITIONCycloneCRYPTO
Lite
CycloneCRYPTO
Pro
CycloneCRYPTO
Ultimate
PricingFrom €1,450
Get a Quote
Contact us
Get a Quote
Contact us
Get a Quote
License
Non-GPL licensing for commercial use with closed source software
Perpetual license (one-time fee)
Royalty free
Delivery & Service
Source code & Doxygen documentation
Warranty & IP infringement protection
12-month Support & Update Agreement (technical support, software updates, update notifications, migration guide, bug & security fixing)
Symmetric Cryptographic Algorithms
Base64 encoding, hash functions (MD2, MD4, MD4, RIPEMD-128, RIPEMD-160, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, Tiger/192, Whirlpool), stream ciphers (RC4, Trivium), block ciphers (RC2, RC6, IDEA, DES, 3DES, AES, Camellia, ARIA, SEED, PRESENT), block cipher modes (ECB, CBC, CFB, OFB, CTR, XTS), message authentication algorithms (HMAC, CMAC, GMAC)
Asymmetric Cryptographic Algorithms
AEAD cipher modes (GCM and CCM), Diffie-Hellman key exchange (DH) RSA public key cryptography, Digital Signature Algorithm (DSA), Elliptic Curve Cryptography (ECC), Elliptic Curve DSA (ECDSA), Elliptic Curve Diffie-Hellman (ECDH), NIST-P and Brainpool elliptic curves, Multiple precision arithmetic library, X.509 certificate parsing, PEM file import functions
Advanced Cryptographic Algorithms
SHA-3 family hash functions, BLAKE2 family hash functions, SHAKE128 & SHAKE256 XOFs, Keccak sponge function, KMAC message authentication ChaCha encryption algorithm, Poly1305 message authentication, ChaCha20Poly1305 AEAD, ECDH over Curve25519 and Curve448 elliptic curves, EdDSA signature scheme (Ed25519 & Ed448), bcrypt and scrypt password hashing, X.509 certificate and CSR generation, PEM file export functions
Option
Hardware Crypto Acceleration

Choose our Commercial License for:

SVG

Proprietary

If you develop proprietary commercial applications with closed source, use of a Commercial License is required.

SVG

Priority Support

You will have access to priority technical support with software maintenance for updates & security patches.

SVG

Modification

This license gives the right to develop and modify our software to embed it in your commercial products.

SVG

IP Protection

We guarantee that 100% of our commercial software packages have been developed in-house.

SVG

Custom Services

Our customers are entitled to fair pricing for custom connectivity related software development or expertise.

SVG

Royalty-Free

All our standard Commercial Licenses are royalty-free licenses (one-time license fee), making licensing easier.