Skip navigation

Security and cryptography libraries for embedded systems

Security and Cryptography are essential for all embedded systems. Whether you want to protect your IP against counterfeiting, your devices against manipulation or data collected on the devices against snooping, SEGGER's Embedded Experts got you covered. 



SEGGER's cryptographic and security libraries have been built from the ground up for embedded systems. The resulting libraries are extremely fast and use little resources in memory.

You can select whether you want to use a protocol, that already is fully implemented such as SSH (emSSH), and TLS (emSSL), or you can pick emCrypt and create your own security protocol based on proven, state of the art algorithms.

SEGGER - Crypto Libraries

Crypto & Security

Security libraries optimized for embedded systems



Secure your device and stop cloners

emSecure is a software solution to securely authenticate digital assets. It can be used to secure products at no per unit cost against hacking and cloning.


SEGGER - emSSH Product Icon

Provide security for the administration interface of your device

emSSH is a software library that enables secure login to your embedded system. emSSH offers the possibility to establish a secured connection to any server application in your product. It can be used both target independent in native computer applications, as well as in embedded targets.


SEGGER - emSSL Product Icon

Reliable, secure and build for IoT devices

emSSL is software library that enables secure connections across the Internet. emSSL offers both client and server capability. SSL/TLS is a must-have in nearly every application which is connected to the Internet. Products of the IoT, smart grid or home automation markets benefit from securing their communication


SEGGER - emCrypt Product Icon

Create reliable security protocols

emCrypt is a state-of-the-art cryptographic algorithm library that scales well from resource-constrained devices, such as deeply embedded systems to workstations. It is ideally suited to create security protocols