JAVA Toolkit
| home | contact

Home > Products > All Products > Proxy Tunnel



News Menu

Latest News

iSaSiLk 5.107 released!

13/12/2017

iSaSiLk 5.107 has improved its countermeasure against variants of the PKCS#1 Bleichenbacher attack and adds support for the Application Layer Protocol Negotiation (ALPN) extension!

IAIK-JCE 5.5 released!

29/08/2017

IAIK-JCE 5.5 fixes a signature algorithm name incompatibility in JSSE algorithm constraint checking, implements SHA-3 based signature and HMAC algorithms, and adds throughout support for using the IAIK provider without the necessity of installing it within the JCA/JCE Security framework.

References

Our Clients


Proxy Tunnel

IAIK Proxy Tunnel is available for free. The Proxy Tunnel is an application based on IAIK JCE and iSaSiLk that makes it possible to add security features to existing applications and protocols without changing the underlying applications.

The Proxy Tunnel is an application based on IAIK JCE and iSaSiLk that makes it possible to add security features to existing applications and protocols without changing the underlying applications. It secures TCP connections over insecure networks by using SSL,which guarantees authentication, confidentiality, integrity and authorization. It is very flexible and user configurable.

Features:

  • Written purely in Java™ language, it can be used on any platform supporting JDK 1.1 or later.
  • Employs industry standard TLS v1 and SSL v3 encryption.
  • Independent of underlying applications and protocols, can be used e.g. for secure telnet.
  • Can be used to build a VPN.
  • Supports all SSL v3 cipher suites and can be used with RSA, DSA, DH for authentication and key agreement, DES, TripleDES, RC2 and RC4 for data encryption. Use of algorithms is fully user-configurable.
  • Can be used as an "SSL-amplifier" upgrading 40-bit security of exportable browsers to 128-bit security. Can be used to add HTTPS to any Web server as well.
  • Fully configurable trust settings.
  • Allows configurable access control based on IP addresses and/or client certificates.
  • Simple CA software included.

After registering, you can download and use the proxy-tunnel for free!

Acknowledgements

ICE-CAR

TELEMATICS for Research Initiative within the European TELEMATICS APPLICATIONS Programme (Research Sector, 1998-2000 Contracts, Project RE 4006) via the ICE-CAR project.


 
print    tip a friend
back to previous page back  |  top to the top of the page