Intel® Cryptography Primitives Library
Secure, fast, lightweight building blocks for cryptography, optimized for Intel® CPUs.
Develop highly performant and secure applications using our open-source software library.
Open Standards and Performance in Security
Use Intel® Cryptography Primitives Library to improve the performance of cryptographic operations in multimedia, enterprise data, embedded, communications, and scientific and technical applications.
This common cross-platform and cross-operating system API for routines is commonly used for cryptographic operations:
- Security (constant-time running for secret processing functions)
- Designed for the small footprint size
- Optimized for Intel CPUs and instruction set architectures including hardware cryptography instructions
- Configurable CPU dispatching for the best performance
- Kernel mode compatibility
- Thread-safe design
- Data protection in the post-quantum era
- FIPS 140 compliance
What's New
- Intel® Integration Performance Primitives Cryptography (Intel® IPP Cryptography) is now Intel Cryptography Primitives Library
- Experience the power of dispatching on an Intel® Xeon® 6 processor, turbocharging RSA encryption (2K, 3K, 4K) with multi-buffer capabilities.
- Explore the future of hashing with our enhanced SM3 algorithm, now 5x faster thanks to the SM3_NI instruction.
- Enhanced data protection in a post-quantum era with a new Intel-optimized LMS post-quantum crypto algorithm.
- Advanced AES-GCM performance on Intel Xeon 6 processors and Intel® Core™ Ultra mobile and desktop processors with simplified integration and new code samples.
Download as Part of the Toolkit
Intel Cryptography Primitives Library is included in the Intel® oneAPI Base Toolkit (Base Kit), which is a core set of tools and libraries for developing high-performance, data-centric applications across diverse architectures.
Download the Stand-Alone Version
A stand-alone download of Intel Cryptography Primitives Library is available. You can download binaries from Intel or choose your preferred repository.
Features
The library provides a comprehensive set of routines commonly used for cryptographic operations, including:
- Symmetric Cryptography Primitive Functions
- AES (ECB, CBC, CTR, OFB, CFB, XTS, GCM, CCM, SIV)
- SM4 (ECB, CBC, CTR, OFB, CFB, CCM)
- TDES (ECB, CBC, CTR, OFB, CFB)
- RC4
- One-Way Hash Primitives
- SHA-1, SHA-224, SHA-256, HSA-384, SHA-512
- MD5
- SM3
- Data Authentication Primitive Functions
- HMAC
- AES-CMAC
- Public Key Cryptography Functions
- RSA, RSA-OAEP, RSA-PKCS_v15, RSA-PSS
- DLP, DLP-DSA, DLP-DH
- ECC (NIST curves), ECDSA, ECDH, EC-SM2
- Multi-buffer RSA, ECDSA, SM3, x25519
- Finite Field Arithmetic Functions
- Big Number Integer Arithmetic Functions
- PRNG/TRNG and Prime Numbers Generation
- FIPS 140 Compliance
- Post-Quantum Functions
- XMSS
- LMS
Security for All Aspects of Business and Daily Life
Telecommunications
Privacy and Encryption
Banking
Secure Autonomous AI
Data Security and ID Verification
Cloud and Database Security
Intel® Multi-Buffer Crypto for IPSec
The library provides software crypto acceleration primarily targeting packet processing applications. It can be used for applications such as IPsec, TLS, Wireless (RAN), cable, or MPEG DRM.
The library is hosted on GitHub and is used as a software crypto provider in DPDK*, Intel® QuickAssist Technology Engine for OpenSSL*, and FD.io.
Security and Privacy
Both security and privacy are important in the physical and digital worlds. Privacy is the right to control how your information is viewed and used, while security is protection against threats or danger.
Federal Information Processing Standards (FIPS)
FIPS is developed and managed by the National Institute of Standards and Technology (NIST) together with the Canadian Communications Security Establishment (CSE).
Post-Quantum Cryptography
This field of cryptography focuses on developing cryptographic algorithms that are resistant to attacks from quantum computers.
Documentation and Resources
Tutorials
- Exceed FIPS 140 Level 1 Information Security with Intel Cryptography Primitives Library
- AES-GCM Acceleration with Intel Cryptography Primitives Library
- Post-Quantum Algorithms in Intel Cryptography Primitives Library
Code Samples
Security and Privacy at Intel
Get Help
Intel Support
Your success is our success. Access these support resources when you need assistance.
How to Contribute
We welcome community contributions to Intel Cryptography Primitives Library.
If you have an idea of how to improve the product:
- Let us know through the GitHub Forum.
- Send your proposal directly using a pull request.