Intel® Cryptography Primitives Library
Secure, fast, lightweight building blocks for cryptography, optimized for Intel® CPUs.
Develop highly performant and secure applications using our open-source software library.
Security Starts with Intel
Security and Privacy
Both security and privacy are important in the physical and digital worlds. Privacy is the right to control how your information is viewed and used, while security is protection against threats or danger. In the digital world, security generally refers to the unauthorized access of data, often involving protection against hackers or cyber criminals.
Privacy
Privacy is the right to control how your information is used and viewed and to ensure it's used in a way that respects your rights and complies with legal standards. This includes how companies collect, manage, store, and control your data. For example, you might have privacy concerns about whether a company respects your wishes for how they use your data.
Security
Protect your information from unauthorized access or threats, such as hackers or cybercriminals. This includes protecting your data from malicious attacks and the exploitation of stolen data.
Privacy and security are complementary forces that work together to provide protected, usable data. For example, privacy dictates how security options should be implemented, and privacy is impossible to enforce without a secure system. However, some people consider privacy and security to be the same thing because they sometimes overlap.
Reliability
All cryptography algorithms included in the Intel® Cryptography Primitives Library undergo rigorous testing and cryptography internal standards compliance reviews before being published.
Intel Cryptography Primitives Library makes it accessible and scalable to meet both goals of modern cybersecurity.
Get Help
Intel Support
Your success is our success. Access these support resources when you need assistance.
How to Contribute
We welcome community contributions to Intel Cryptography Primitives Library.
If you have an idea of how to improve the product:
- Review the contribution rules.
- Send your proposal directly using a pull request.