Latest Java Releases
Release 1.52 is now available for download.
This release includes bug fixes, security enhancements, and other improvements. Enhancements include support classes for DNS-based Authentication of Named Entities (DANE), support for AES GCM in CMS Enveloped Data, support for BCrypt and it's OpenBSD variant and support for both the DRBG and signing algorithms used in X9.31. TLS updates include the addition of server-sise support for DHE key exchange, (EC)DSA now supports non-SHA1 digests, and support has been added for the PSK, SRP, and ECDHE_ECDSA/AES/CCM ciphersuites. On bug fixes: OSGI issues with the bcmail distribution should now be fixed, PKCS5/PKCS7 padding now supports pad values > 127, a StackOverflowError in the CertPath validator associated with multiple trust anchors has been fixed, and corrupted input into a RFC5649WrapEngine no longer has the potential to cause OutOfMemoryError. Finally, computations associated with SkippingCiphers have been optimised to improve seek performance and an issue which could cause some zero bytes to appear in an "odd sized" requests to the SP 800-90A CTR DRBG has been fixed. Further details on other additions and bug fixes can be found in the release notes file accompanying the release.
Security Advisory: The CTR DRBG is related to making requests to the DRBG that are not a multiple of the block size of the underlying block cipher. If this sounds like you, you need to upgrade to this release, or contact us for a work around.
Others have contributed to this release, both with code and/or financially. You can find them listed in the contributors file. We would also like to thank holders of Crypto Workshop support contracts as an additional 60 hours of time was contributed back to this release through left over consulting time provided as part of their support agreements. Thank you, one and all!
Note: this release has seen some further clean out of deprecated methods with the OpenPGP API being the main candidate.
One other note: if you're new to the new style of operator in OpenPGP and CMS and co, a brief document on how they are supposed to hang together is available on the BC wiki. If you think you are likely to do this a lot, you might also be interested in our guide project, which is now available as an initial draft. Please also see the porting guide for advice on porting to this release from much earlier ones (pre 1.46).
If you're interested in grabbing the lot in one hit (includes JCE, JCE provider, light weight API, J2ME, range of JDK compatibility classes, signed jars, fries, and king prawns...) download crypto-152.tar.gz or crypto-152.zip, otherwise if you are only interested in one version in particular, see below.
Keeping the Bouncy Castle Project Going
With various algorithm changes, updates, security issues in protocols, and having to write vendor statements for organisations like CERT, keeping the Bouncy Castle project going is turning into a full time job and several of us have now given up permanent work in order to free up time to work on it. If you are making use of our software, and are interested in making sure we are always here when you need us, there are two principal ways you can help.
The first is by getting a support contract or by sponsoring specific work on the project. Not only will you get a hot-line to Bouncy Castle developers, consulting time, and release alerts if you need them, but, if you wish, we will also acknowledge your support publicly. You can find out further information on support contracts and consulting at Crypto Workshop.
Secondly, the Bouncy Castle APIs are now formally owned by a registered Australian Charity, the Legion of the Bouncy Castle Inc, ABN 84 166 338 567. Without considering the costs of actually doing what we do, we're also trying to raise money to allow us to get certifications such as FIPs for the APIs. We can accept donations via PayPal, Bitcoin, or direct transfer. If this sounds more like you, and you want to see this project continue to prosper, please visit our donations page to help. Thanks!
Signed JAR files
From release 1.40 some implementations of encryption algorithms were removed from the regular jar files at the request of a number of users. Jars with names of the form *-ext-* still include these (at the moment the list is: NTRU).
|Provider||Clean room JCE|
|JDK 1.5 - JDK 1.8||bcprov-jdk15on-152.jar
The following signed provider jars are provided so that you can make use of the debug information in them. In the case of the non-provider jars (bcpkix, bcpg, and bcmail), the jar files do not need to be signed to work. You can rebuild them with debug turned on, or operate directly from the source, if you need.
|Providers with debug|
|JDK 1.5 - JDK 1.8||bcprov-debug-jdk15on-152.jar||bcprov-ext-debug-jdk15on-152.jar|
Sources and JavaDoc
|JDK 1.5 - JDK 1.8||bcpkix-jdk15on-152.tar.gz||bcpkix-jdk15on-152.zip|
|JDK 1.5 - JDK 1.8||bcpg-jdk15on-152.tar.gz||bcpg-jdk15on-152.zip|
|JDK 1.5 - JDK 1.8||bcmail-jdk15on-152.tar.gz||bcmail-jdk15on-152.zip|
|JCE with provider and lightweight API||Lightweight API|
|JDK 1.5 - JDK 1.8||bcprov-jdk15on-152.tar.gz||bcprov-jdk15on-152.zip||lcrypto-jdk15on-152.tar.gz||lcrypto-jdk15on-152.zip|
|Releases no longer maintained|
You can find the release notes, documentation, and specifications here.
You can find checksums for confirming the integrity of the distributions here
Too slow? You can also find the latest versions on one of our mirrors:
The current working betas, when available, for the next release for JDK 1.3 to JDK 1.8 can be found at http://www.bouncycastle.org/betas. If you need a beta to be made available for another version of Java please ask by emailing firstname.lastname@example.org.
The BC jars are now mirrored on the Maven central repository. You can find them at http://repo2.maven.org/maven2/org/bouncycastle.
Just want to look at the source? The source code repository is now mirrored on GitHub and accessible from here. The repository can be cloned using either
git clone https://github.com/bcgit/bc-java.gitor git protocol
git clone git://github.com/bcgit/bc-java.git
Previous releases, as well as the latest ones, can be downloaded from our ftp server ftp.bouncycastle.org. Please note the FTP server does not support passive mode.