Oracle Unveils Open-Source JCipher: A FIPS-Compliant Java Cryptography Provider for Better Security and Performance

In a significant move towards enhancing security and performance, Oracle has made the decision to open-source Jipher, a Java Cryptography Architecture (JCA) provider. This provider was specifically built to meet the stringent requirements of the Federal Information Processing Standard (FIPS) 140. With its development, Oracle has witnessed impressive performance improvements within their own infrastructure, particularly in the Oracle Cloud Infrastructure. This article delves into the details of Jipher, its features, and the impact it will have on the Java application ecosystem.

Development of Jipher for FIPS 140 Requirements and Performance Improvements

Jipher came into being to cater to the needs of environments with FIPS 140 requirements. These requirements demand robust security procedures and algorithms for cryptographic systems. Not only does Jipher align perfectly with these requirements, but it has also demonstrated remarkable performance enhancements within the Oracle Cloud Infrastructure. The development of Jipher has showcased Oracle’s commitment to delivering high-security solutions without compromising on performance.

Offering Jipher as Open Source Through OpenJDK

Oracle is further extending the advantages of Jipher by making it available as open source through the Open Java Development Kit (OpenJDK). This strategic move is aimed at supporting Project Panama-based Java applications. By offering Jipher via open source, Oracle provides developers with the tools they need to build secure and high-performing applications, encouraging innovation and collaboration within the Java community.

Cipher Provider Supporting FIPS-approved Algorithms

One of the key aspects of Jipher is its support for algorithms allowed by FIPS. This means that Jipher adheres to the stringent security standards set forth by FIPS and can achieve competitive performance when compared to other providers. This ensures that organizations utilizing Jipher can confidently meet the security requirements dictated by FIPS while enjoying optimal performance.

Exploring Java Cryptography Architecture (JCA)

Java Cryptography Architecture (JCA) is a widely used framework in the Java ecosystem that provides a range of security-related functionalities. JCA boasts a flexible provider architecture that allows developers to leverage different cryptographic algorithms and protocols. With Jipher as the newly released provider, the community can benefit from its advanced security features and easily incorporate them into their Java applications.

Oracle’s Zero Trust Packet Routing Platform for Enhanced Data Security

In addition to open-sourcing Jipher, Oracle has disclosed plans to launch the Oracle Zero Trust Packet Routing Platform. This platform aims to revolutionize data and network security in distributed IT environments. By implementing the zero-trust model, the platform enables organizations to protect their data from potential breaches while ensuring secure routing within their networks. This innovative solution will significantly enhance data security and privacy for organizations of all sizes.

Collaboration For a New Open Standard in Data and Network Security

Recognizing the importance of collaboration in driving innovation, Oracle is actively seeking partnerships with other organizations to develop a new open standard for data and network security. By collaborating with industry leaders, Oracle aims to establish a comprehensive and widely adopted standard that supports robust security practices. This open standard will provide organizations with the framework they need to protect their sensitive data in complex, distributed environments.

Supporting Cloud-Native Computing and Open-Source Projects

As part of its commitment to cloud-native computing and fostering open-source projects, Oracle has pledged a remarkable contribution of $3 million in credits on Ampere Arm-based hardware per year for three years. This contribution will greatly benefit the Cloud Native Computing Foundation (CNCF) and will further support the development and advancement of open-source projects hosted by CNCF on Oracle Cloud Infrastructure (OCI). Oracle’s dedication to the growth of cloud-native computing exemplifies their commitment to innovative technologies and open collaboration.

In conclusion, the open-sourcing of Jipher by Oracle marks a significant milestone in the Java ecosystem. By offering enhanced security, compliant with FIPS 140 requirements, and notable performance improvements, Jipher provides developers with a powerful tool to build secure and efficient Java applications. Oracle’s commitment to data and network security is further evidenced by the forthcoming Zero Trust Packet Routing Platform and their collaboration efforts towards developing an open standard. With its generous contribution to CNCF, Oracle demonstrates its commitment to advancing cloud-native computing and supporting open-source projects. This strategic move by Oracle sets the stage for a more secure, innovative, and collaborative Java development landscape.

Explore more

Maryland Data Center Boom Sparks Local Backlash

A quiet 42-acre plot in a Maryland suburb, once home to a local inn, is now at the center of a digital revolution that residents never asked for, promising immense power but revealing very few secrets. This site in Woodlawn is ground zero for a debate raging across the state, pitting the promise of high-tech infrastructure against the concerns of

Trend Analysis: Next-Generation Cyber Threats

The close of 2025 brings into sharp focus a fundamental transformation in cyber security, where the primary battleground has decisively shifted from compromising networks to manipulating the very logic and identity that underpins our increasingly automated digital world. As sophisticated AI and autonomous systems have moved from experimental technology to mainstream deployment, the nature and scale of cyber risk have

Ransomware Attack Cripples Romanian Water Authority

An entire nation’s water supply became the target of a digital siege when cybercriminals turned a standard computer security feature into a sophisticated weapon against Romania’s essential infrastructure. The attack, disclosed on December 20, targeted the National Administration “Apele Române” (Romanian Waters), the agency responsible for managing the country’s water resources. This incident serves as a stark reminder of the

African Cybercrime Crackdown Leads to 574 Arrests

Introduction A sweeping month-long dragnet across 19 African nations has dismantled intricate cybercriminal networks, showcasing the formidable power of unified, cross-border law enforcement in the digital age. This landmark effort, known as “Operation Sentinel,” represents a significant step forward in the global fight against online financial crimes that exploit vulnerabilities in our increasingly connected world. This article serves to answer

Zero-Click Exploits Redefined Cybersecurity in 2025

With an extensive background in artificial intelligence and machine learning, Dominic Jainy has a unique vantage point on the evolving cyber threat landscape. His work offers critical insights into how the very technologies designed for convenience and efficiency are being turned into potent weapons. In this discussion, we explore the seismic shifts of 2025, a year defined by the industrialization