Follow us on:  Google+   


Welcome to the home of the Legion of the Bouncy Castle Java cryptography APIs.

The Legion of the Bouncy Castle

The Bouncy Castle Crypto APIs are looked after by an Australian Charity, the Legion of the Bouncy Castle Inc. which looks after the care and feeding of the Bouncy Castle APIs. If you would like to help support this effort please see our donations page or purchase a support contract through Crypto Workshop. Requests to sponsor specific enhancements and other work on the APIs are also most welcome.

The Bouncy Castle Crypto APIs for Java consist of the following:

  • A lightweight cryptography API.

  • A provider for the Java Cryptography Extension and the Java Cryptography Architecture.

  • A clean room implementation of the JCE 1.2.1.

  • A library for reading and writing encoded ASN.1 objects.

  • Lightweight APIs for TLS (RFC 2246, RFC 4346) and DTLS (RFC 4347).

  • Generators for Version 1 and Version 3 X.509 certificates, Version 2 CRLs, and PKCS12 files.

  • Generators for Version 2 X.509 attribute certificates.

  • Generators/Processors for S/MIME and CMS (PKCS7/RFC 3852).

  • Generators/Processors for OCSP (RFC 2560).

  • Generators/Processors for TSP (RFC 3161 & RFC 5544).

  • Generators/Processors for CMP and CRMF (RFC 4210 & RFC 4211).

  • Generators/Processors for OpenPGP (RFC 4880).

  • Generators/Processors for Extended Access Control (EAC).

  • Generators/Processors for Data Validation and Certification Server (DVCS) - RFC 3029.

  • Generators/Processors for DNS-based Authentication of Named Entities (DANE).

  • Signed jar versions suitable for JDK 1.4-1.8 and the Sun JCE.

The lightweight API works with everything from the J2ME to the JDK 1.8 and we now provide certificate generation, PKCS/CMS/CRMF/CMP/EAC/DANE/DVCS/TSP/TLS/DTLS and OpenPGP support across the full range of JDKs.

Except where otherwise stated, software produced by this site is covered by the following license.

Looking for something not listed? Have a look at the projects listed on our resources page.

Keep in touch!

For those who are interested, there are two mailing lists for participation in this project. To subscribe use the links below. (To unsubscribe, replace subscribe with unsubscribe in the message body) with subscribe in the message body. This mailing list is for new release announcements only, general subscribers cannot post to it. with subscribe in the message body. This mailing list is for discussion of development of the package. This includes bugs, comments, requests for enhancements, questions about use or operation.

NOTE:You need to be subscribed to send mail to the above mailing list.

A searchable archive of the dev mailing list is accessible off the mailing lists page.

If you want to provide feedback, offers of jobs (or more importantly beer) directly to the members of The Legion then please use



BC Java FIPS API stable.

Friday 31st July 2015

The BC Java FIPS project has finally been stabilized and will be going in for testing soon thanks to our major sponsor - Tripwire. Details on the FIPS project are available in the BC FIPS description document. For further information please contact us at

Java Release 1.52 is now available for download.

Sunday 1st March 2015

This release includes support for DNS-based Authentication of Named Entities (DANE), BCrypt and it's OpenBSD variant, and for both the DRBG and signing algorithms used in X9.31. TLS updates include the addition of server-sise support for DHE key exchange, (EC)DSA now supports non-SHA1 digests, and support has been added for the PSK, SRP, and ECDHE_ECDSA/AES/CCM ciphersuites. On bug fixes: OSGI issues with bcmail*.jar should now be fixed, PKCS5/PKCS7 padding supports pad values > 127, and corrupted input into a RFC5649WrapEngine no longer has the potential to cause OutOfMemoryError. SkippingCiphers have improved seek performance and an issue which could cause some zero bytes to appear in an "odd sized" request to the SP 800-90A CTR DRBG has been fixed. A number of other improvements have been made and a number of bugs have been fixed.

For more details go to our latest releases page to download the new version and see the release notes

You can also find the latest versions on one of our mirrors:

Sponsored Links