Intel® Cryptography Primitives Library
Secure, fast, lightweight building blocks for cryptography, optimized for Intel® CPUs.
Develop highly performant and secure applications using our open-source software library.
Open Standards and Performance in Security
Use Intel® Cryptography Primitives Library to improve the performance of cryptographic operations in multimedia, enterprise data, embedded, communications, and scientific and technical applications.
This common cross-platform and cross-operating system API for routines is commonly used for cryptographic operations:
- Security (constant-time running for secret processing functions)
- Designed for the small footprint size
- Optimized for Intel CPUs and instruction set architectures including hardware cryptography instructions
- Configurable CPU dispatching for the best performance
- Kernel mode compatibility
- Thread-safe design
- Data protection in the post-quantum era
- FIPS 140 compliance
What's New
- Intel® Integrated Performance Primitives Cryptography (Intel® IPP Cryptography) is now Intel Cryptography Primitives Library
- Experience the power of dispatching on an Intel® Xeon® 6 processor, turbocharging RSA encryption (2K, 3K, 4K) with multi-buffer capabilities.
- Explore the future of hashing with our enhanced SM3 algorithm, now 5x faster thanks to the SM3 instruction.
- Enhanced data protection in a post-quantum era with a new Intel-optimized LMS post-quantum crypto algorithm.
- Advanced AES-GCM performance on Intel Xeon 6 processors and Intel® Core™ Ultra mobile and desktop processors with simplified integration and new code samples.
Optimizations
The Intel Cryptography Primitives Library applies:
- Hardware cryptography instructions (AES-NI, SHA extensions) to accelerate cryptographic operations, improving performance and efficiency
- Multi-buffer processing allowing for parallel processing of multiple data buffers, enhancing throughput
- CPU dispatching to ensure the best available optimizations are used based on CPU capabilities of different Intel® processors
- Algorithmic optimizations:
- Karatsuba multiplication algorithm
- Montgomery modular multiplication scheme
- Precomputed value tables of values
- Folding approach for multiply-reduce routines.
And more.
This ensures you are always at the forefront of cryptographic performance.
Download as Part of the Toolkit
Intel Cryptography Primitives Library is included in the Intel® oneAPI Base Toolkit (Base Kit), which is a core set of tools and libraries for developing high-performance, data-centric applications across diverse architectures.
Download the Stand-Alone Version
A stand-alone download of Intel Cryptography Primitives Library is available. You can download binaries from Intel or choose your preferred repository.
Download Source Code from a GitHub* Repository
The Intel Cryptography Primitives Library is also available as an open source project. You can access it via GitHub* and actively contribute to its evolution.
Features
The library provides a comprehensive set of routines commonly used for cryptographic operations, including:
- Symmetric Cryptography Primitive Functions
- AES (ECB, CBC, CTR, OFB, CFB, XTS, GCM, CCM, SIV)
- SM4 (ECB, CBC, CTR, OFB, CFB, CCM)
- TDES (ECB, CBC, CTR, OFB, CFB)
- RC4
- One-Way Hash Primitives
- SHA-1, SHA-224, SHA-256, HSA-384, SHA-512
- MD5
- SM3
- Data Authentication Primitive Functions
- HMAC
- AES-CMAC
- Public Key Cryptography Functions
- RSA, RSA-OAEP, RSA-PKCS_v15, RSA-PSS
- DLP, DLP-DSA, DLP-DH
- ECC (NIST curves), ECDSA, ECDH, EC-SM2
- Multi-buffer RSA, ECDSA, ECDH, x25519, SM2, SM3, SM4, and more
- Finite Field Arithmetic Functions
- Big Number Integer Arithmetic Functions
- PRNG/TRNG and Prime Numbers Generation
- FIPS 140 Compliance
- Post-Quantum Functions
- XMSS
- LMS
Security for All Aspects of Business and Daily Life
Telecommunications
Privacy and Encryption
Banking
Secure Autonomous AI
Data Security and ID Verification
Cloud and Database Security
Benchmarks
These benchmarks illustrate the performance capabilities of Intel Cryptography Primitives Library.
Security and Privacy
Both security and privacy are important in the physical and digital worlds. Privacy is the right to control how your information is viewed and used, while security is protection against threats or danger.
Federal Information Processing Standards (FIPS)
FIPS is developed and managed by the National Institute of Standards and Technology (NIST) and the Canadian Communications Security Establishment (CSE).
Post-Quantum Cryptography
This field of cryptography focuses on developing cryptographic algorithms that are resistant to attacks from quantum computers.
Also Available: Intel® Multi-Buffer Crypto for IPSec
This separately available library provides software crypto acceleration primarily targeting packet processing applications. It can be used for applications such as IPSec, TLS, wireless (RAN), cable, or MPEG DRM.
The library is hosted on GitHub and is used as a software crypto provider in DPDK*, Intel® QuickAssist Technology Engine for OpenSSL*, and FD.io.
Documentation and Resources
Tutorials
- Exceed FIPS 140 Level 1 Information Security with Intel Cryptography Primitives Library
- AES-GCM Acceleration with Intel Cryptography Primitives Library
- Post-Quantum Algorithms in Intel Cryptography Primitives Library
Code Samples
Security and Privacy at Intel
Get Help
Intel Support
Your success is our success. Access these support resources when you need assistance.
How to Contribute
We welcome community contributions to Intel Cryptography Primitives Library.
If you have an idea of how to improve the product:
- Review the contribution rules.
- Send your proposal directly using a pull request.