Skip to main content
  • Products
  • Evaluate our Software
  • Downloads
  • Free Utilities
  • Purchase
  • Support
  • About Us
  • Blog
  • Forum
  • Search
    • Contact Us
    • Forum
    • Knowledge Base
    • Web Shop
    • Newsletter
    • RSS
  •   Jobs
  •   Videos
  •   Blog
  •   Sustainability
  • emCrypt
  • Technology
  • Examples

emCrypt
The cryptographic library for secure applications

emCrypt is a secure and efficient implementation of essential cryptographic algorithms specifically designed for embedded systems.

Contact us
Downloads
Documentation
SEGGER emCrypt
  1. 1.Overview
  2. 2.Key features
  3. 3.Use cases
  4. 4.How emCrypt works
  5. 5.End-to-end encryption
  6. 6.In use at SEGGER
  7. 7.Purchase information
  8. 8.Licensing

Overview

Designed with both efficiency and security in mind, emCrypt serves as a reliable encryption toolkit, offering all of the key components needed for today's secure protocols. In a world full of connected devices, keeping data secure is crucial. With emCrypt, users can trust that their embedded devices are protected against potential threats.


Key features

emCrypt includes various features designed to meet modern security needs, providing high-performance cryptographic solutions with a focus on clean and secure code.

 

Modern cryptogrphay standards


emCrypt adheres to the latest cryptographic standards, ensuring that it provides robust and up-to-date security mechanisms suitable for protecting sensitive data against threats.

Secure, fast, and clean code


The library is designed with a focus on security, performance, and efficiency. The encryption solutions are robust, reliable, and written in code that is clean and easy to maintain.

Intuitive API


emCrypt includes comprehensive support for advanced cryptographic operations such as key derivation, key wrapping, and key encapsulation.


Use cases

emCrypt offers versatile solutions for securing data in various scenarios. Whether safeguarding data during transmission with robust encryption protocols such as emSSL and emSSH, protecting sensitive information stored on devices using XTS-AES encryption, or ensuring data integrity through digital signatures, emCrypt provides comprehensive security against unauthorized access and data tampering.

Use case graphic: Over-the-air connection between J-Link and microcontroller is secured by a lock

Securing data in transmission

emCrypt ensures the protection of data during transmission through robust encryption protocols. Our solutions, such as emSSL and emSSH, use emCrypt's powerful encryption algorithms to secure communications over the internet, preventing unauthorized access and data breaches. 

Broken microcontroller, lock, attacker

Securing data at rest

emCrypt provides robust encryption for data stored on devices, safeguarding sensitive information from unauthorized access. With our XTS-AES encryption technology, we ensure that data remains protected even if the physical device is compromised. This is essential for securing personal data, financial records, and confidential business information.

Use ces graphic: Microcontroller, blue stamp, unsuccessful attacker

Ensuring data integrity

emCrypt uses digital signatures to verify that data comes from a trusted source and has not been tampered with. Using advanced cryptographic algorithms such as RSA, ECDSA, and EdDSA, emCrypt enables the creation and verification of digital signatures. This ensures that data remains tamper-free and authentic.

How emCrypt works

Process diagram showing how applications can use SEGGER tools for secure communication
How applications can use SEGGER tools for secure communication

emCrypt offers a wide range of cryptographic capabilities which are the basis of many security protocols. It can be configured for the minimal memory footprint of constrained devices but can also scale to faster performance on systems that have more resources. A high-quality product, it is designed to be used with ease and without limitations. emCrypt has proven itself within SEGGER and is the foundation that emSSL, emSSH and emSecure-RSA, emSecure-ECDSA are built upon.

emCrypt offers several advanced features, including 

  • An extensive 2,000-page manual that covers all API features and functions   
  • Decoupled implementation ensures that only the necessary components are linked
  • Public key cryptography with RSA, DSA, ECDSA, and EdDSA
  • Fast, tunable ciphers, hash algorithms, and message authentication codes (MACs)
  • Random bit generation and cryptographically secure pseudo-random numbers

Written in ANSI C, it is compiler- and target-independent. It can be implemented in PC applications and embedded systems.


End-to-end encryption

emCrypt provides a range of algorithms, functions, and cryptographic tools needed to implement different security schemes and protocols. It supports advanced protocols like emSSL (SSL and TLS) and emSSH, both of which are built on emCrypt.

For a deeper understanding of how to use emCrypt, explore our example applications. These examples demonstrate how to establish secure communication with end-to-end encryption and set up end-to-end encrypted communication between two clients without user interaction on a single, potentially insecure channel using ECDHE Key Agreement.


In use at SEGGER

emCrypt has proven itself within SEGGER and is the foundation of several security-related tools such as emSSL, emSSH, emSecure-RSA, and emSecure-ECDSA. All of these tools can be combined or used separately. 

emSSL

Read more

emSSL

emSSL enables the creation of secure connections between a client and a server, typically over the…

Read more

emSSH

Read more

emSSH

The secure shell software library emSSH is designed to ensure secure login into an embedded system. 

Read more

emSecure-RSA

Read more

emSecure-RSA

emSecure-RSA is the default version of emSecure, based on RSA asymmetrical encryption.

Read more

emSecure-ECDSA

Read more

emSecure-ECDSA

emSecure-ECDSA offers digital signatures based on the modern elliptic curve digital signature…

Read more

Purchase information

emCrypt-BASE, emCrypt-PRO, and any additional emCrypt modules are only available upon request. Users receive emCrypt as source code, which provides transparency for all included modules and allows inspection by auditors. Written in ANSI C, it is compiler and target independent. It can be implemented in PC applications and embedded systems. Sample applications with source code are also available to demonstrate how to use the emCrypt API.

Free from an open-source or required-attribution license, emCrypt can be integrated into any free, commercial or proprietary product without the need to disclose the combined source. 

Pluggable cryptographic algorithms and hardware acceleration are supported by emCrypt. As an option, hardware acceleration for popular microcontrollers such as Kinetis CAU, STM32 CRYP, EFM32 CRYPTO, LPC18S and LPC43S is available.

Package contents
emCrypt-BASE
  • AES-128, AES-192, AES-256
  • DES
  • TripleDES (also known as 3DES or TDES) with all keying options
  • MD5
  • RIPEMD-160
  • SHA-1
  • SHA-224, SHA-256. SHA-384, SHA-512, SHA-512/224, SHA-512/256
emCrypt-PRO
  • All ciphers (AES, XTS-AES, DES, TripleDES, ARIA, SEED, Camellia, Blowfish, Twofish, IDEA)
  • All hash algorithms (MD5, RIPEMD-160, SHA-1, SHA-2 family, SHA-3 family, SM3)
  • All MAC algorithms (HMAC, CMAC, GMAC, KMAC, Michael)
  • All key derivation algorithms (KDF1, KDF2, HKDF, PBKDF2, X9.63 KDF)
  • All key agreement protocols (DH, ECDH, X25519, X448)
  • All digital signature protocols (RSASSA-PSS, RSASSA-PKCS1, DSA, ECDSA, Ed25519, Ed448)
  • All key generation algorithms, probabilistic and proven primes, for RSA and DSA
  • All random bit generators (Fortuna, Hash_DRBG, HMAC_DRBG, CTR_DRBG)
  • All extendable output functions (SHAKE128, SHAKE256, cSHAKE128, cSHAKE256)
  • All key encapsulation functions (RSAES-OAEP, AESKW, Camellia-KW, ARIA-KW, SEED-KW, Twofish-KW)
  • All NIST prime curves (P-192, P-224, P-256, P-384, P-521)
  • All Brainpool curves and twisted curves (brainpoolP160r1 through brainpoolP512r1) 
  • All self-tests

Detailed pricing information      Request a quotation


Licensing

After successful purchase, SEGGER will provide you with all necessary information to download the software. emCrypt is available under various Embedded Software License models and delivered in source code packages. With a wide range of licensing options, emCrypt can fulfill both commercial and technical requirements. All licenses are one-time payments. emCrypt is royalty-free and not subscription-based.

Get in touch with us

Have questions or need assistance? Our Embedded Experts are here to help!

Reach out to us for:

  • Licensing quotes
  • Technical inquiries
  • Project support

 

Contact us

Headquarters

SEGGER Microcontroller GmbH

Ecolab-Allee 5
40789 Monheim am Rhein, Germany
info@segger.com
Tel.: +49-2173-99312-0
Fax: +49-2173-99312-28

Locations

USA: SEGGER Microcontroller Systems LLC

Boston area
101 Suffolk Lane
Gardner, MA 01440, USA
us-east@segger.com
Tel.: +1-978-874-0299
Fax: +1-978-874-0599

Silicon Valley
Milpitas, CA 95035, USA
us-west@segger.com
Tel.: +1-408-767-4068

China: SEGGER Microcontroller China Co., Ltd.

Room 218, Block A, Dahongqiaoguoji
No. 133 Xiulian Road
Minhang District, Shanghai 201199, China
china@segger.com
Tel.: +86-133-619-907-60

ISO 9001 certified

ISO 9001

30+ years of experience

First-class embedded software tools since 1992
  • Imprint
  • Disclaimer
  • Privacy Policy
© 2025 SEGGER - All rights reserved.