Cryptographic Library


Native ABAP Library

Data Security and protection of Intellectual property has become a necessity in the digital world. The software industry have settled on a number of security standards to protect against cyber attacks, namely AES and RSA. These standards are freely available for use in development projects outside of the SAP environment, but there is no pre-delivered ABAP component that provides this functionality to SAP customers. Until now.

Key capabilities

ABAP Code Obfuscation (hiding)

ABAP Code Obfuscation (hiding)

Prevent unauthorized access to your ABAP code, by obfuscating sensitive methods. Our solution allows the ABAP runtime to access to the original code, but dummy code will be shown in development environment and ABAP debuggers. Source code is digitally signed during transport creation and verified before activation to ensure no tampering has occurred.

AES symmetric block encryption

AES symmetric block encryption

Offers the ability to encrypt and decrypt based on pass phrases. Key sizes supported are 128, 192, 256. Support data streams of unlimited size.


RSA asymmetric key encryption (Private/Public key support)

Our library offers the following capabilities:

  • Encryption/Decryption
  • Sign and verify of data streams of unlimited size
  • Generation of key pairs
  • Saving and loading of PEM format files including X.509 Certificates and encrypted Private key and PEM files


RSA asymmentric key encryption (Private/Public key support)
Encryption for financial document submission
Tax and revenue authorities typically expect documents to be signed or encrypted when communicating electronically. The cryptographic library is able to encrypt and decrypt data streams for this purpose.
Encrypting data at rest
When data is stored in a database or a file system, it is possible to encrypt the data using a variety of encryption algorithms. This adds an additional layer of protection to sensitive data and ensures that anyone that has elevated privileges and can access the data store will not be able to decode the data content.
Sending secure communication

By encrypting information before it is sent to a 3rd party or external system, increases the level of security. Even if the message can be intercepted or copied, the content thereof will still be unreadable without the relevant decryption key.

Messages can also be verified as being generated, so that for sensitive transactions such as payments, the contents can be verified.