Security and cryptography libraries for embedded systems

– Security and Cryptography are essential for all embedded systems.

Whether you want to protect your IP against counterfeiting, your devices against manipulation or data collected on the devices against snooping, SEGGER’s Embedded Experts got you covered.

SEGGER’s cryptographic and security libraries have been built from the ground up for embedded systems. The resulting libraries are extremely fast and use little resources in memory. You can select whether you want to use a protocol, that already is fully implemented such as SSH (emSSH), and TLS (emSSL), or you can pick emCrypt and create your own security protocol based on proven, state of the art algorithms.

Crypto & Security

– Security libraries optimized for embedded systems

Secure your device and stop cloners

emSecure is a software solution to securely authenticate digital assets. It can be used to secure products at no per unit cost against hacking and cloning.

Reliable, secure and build for IoT devices

emSSL is software library that enables secure connections across the Internet. emSSL offers both client and server capability. SSL/TLS is a must-have in nearly every application which is connected to the Internet. Products of the IoT, smart grid or home automation markets benefit from securing their communication.

Dedicated, fast algorithms

The emLib product family offers extremely efficient single purpose modules for AES-, and DES-encryption, as well as CRC-checksums.

Provide security for the administration interface of your device

emSSH is a software library that enables secure login to your embedded system. emSSH offers the possibility to establish a secured connection to any server application in your product. It can be used both target independent in native computer applications, as well as in embedded targets.

Create reliable security protocols

emCrypt is a stat-of-the-art cryptographic algorithm library that scales well from resource-constrained devices, such as deeply embedded systems to workstations. It is ideally suited to create security protocols.

Do you wish more information!

Contact us for offers, information or advice!