BP-Tools (including the core executable bp-ccalc.exe, officially known as the BP-Cryptographic Calculator or BP-CCALC) is a specialized freeware suite developed by EFTlab Pty Ltd (also styled as EFTlab Ltd), an Australian company focused on electronic funds transfer (EFT), payment transaction services, and related technologies. Originally released in the early-to-mid 2010s and last publicly updated around 2015 on SourceForge, the suite was designed as a practical, desktop-based toolkit for developers, testers, and engineers working in the payments industry. It supports everything from basic cryptographic operations to complex EMV card data handling, key management, HSM (Hardware Security Module) simulations, and protocol-specific calculations used in ATM/POS, issuer/host processing, and card personalization workflows.
The primary component,
bp-ccalc.exe, is a Windows GUI application (with some Linux compatibility noted in older documentation) that functions as a comprehensive
Cryptographic Calculator. It is organized into multiple dedicated menus, each covering a category of operations essential for payment system development, testing, debugging, and benchmarking. The full BP-Tools suite also historically included companion tools such as:
- BP-CEDIT (bp-cedit.exe): Thales P3 Input/Output file editor for card personalization data.
- BP-EMVT (bp-emvt.exe): EMV-specific tool for parsing and validating chip card data.
- BP-HCMD (bp-hcmd.exe): Thales HSM Commander for interacting with Thales payShield HSMs.
These tools were distributed as a single freeware package and were widely used in the industry for tasks that would otherwise require expensive commercial simulators or manual scripting in tools like Python or custom C++ code.
Detailed Functionality of BP-CCALC (Cryptographic Calculator)
The calculator is divided into six main menu sections (as documented in EFTlab’s own tutorials, which remain publicly available and highly detailed even in 2026). Here is a comprehensive breakdown based on the official tutorial content:
- Generic Menu(non-cipher, utility-focused operations):
- Hashes: Compute MD4, MD5, SHA-1/224/256/384/512, RIPEMD-160, TIGER-192, CRC32 variants, WHIRLPOOL.
- Character Encoding: Bidirectional conversions between Hex, Binary, ASCII, and EBCDIC.
- BCD Encoding: Binary-Coded Decimal conversions.
- Check Digits: Luhn (MOD 10) for credit cards/IMEI and AMEX SE Number (MOD 9).
- Base64 & Base94: Encoding/decoding binary data to printable ASCII.
- Message Parser: Parses ISO 8583 (1987), ATM NDC, and Wincor/Nixdorf traces into structured, human-readable JSON-like output with field mappings.
- RSA DER Public Key: Encode/decode RSA public keys in DER ASN.1 format (modulus + exponent).
- UUID Generator: Generates random UUID v4.
- Example log output (from official tutorial): Hashing produces clear delimited results with input data, algorithm, and hex output.
- Cipher Menu: Full support for symmetric/asymmetric operations including AES, DES/3DES, RSA encryption/decryption, padding schemes (PKCS#1, OAEP, etc.).
- Keys Menu: Key generation, import/export, parity adjustment, Key Encrypting Keys (KEK), derivation, and validation.
- Payments Menu: Payment-specific crypto – PIN blocks (ISO 9564 formats), CVV/CVV2/iCVV generation, MAC calculation, DUKPT (Derived Unique Key Per Transaction), IPEK/PEK handling.
- EMV Menu: The most powerful section for chip-card work:
- Application Cryptograms (ARQC, AAC, TC, etc.) for Visa, Mastercard, and others.
- Session key derivation, UDK (Unique Derived Keys), SDA/DDA/CDA validation.
- TLV (Tag-Length-Value) parsing, secure messaging (Visa/Mastercard variants).
- Specific calculators for cryptogram generation, ARPC, etc.
- Development Menu and Secure Messaging sections: Additional utilities for scripting, testing, and protocol-specific secure channels.
The application logs every operation with timestamps (e.g., “[2014-01-10 12:04:35 PM] BP-Tools – Cryptographic Calculator is ready”), making it ideal for audit trails in development environments. It handles hex/binary input/output seamlessly and includes built-in help for each function. Many tutorials demonstrate real-world use cases, such as SDA validation with Thales P3 data, SSL/TLS certificate handling, and full key-exchange session preparation.
Current Availability Status (as of April 2026)
BP-Tools is no longer offered as a free public download. The official SourceForge project page (last updated 2015) explicitly states that files are no longer available, and the project maintainer (Jan Bilek) confirmed in an August 2024 discussion thread: “BP-Tools is not available for free download anymore. I would recommend going through
https://www.eftlab.com.au/contact-us and contact EFTlab directly. They should be pretty responsive.”
EFTlab has shifted its focus to commercial, enterprise-grade products:
- Their main website now promotes a next-gen cloud-based payments platform with scalable processing, banking modules, and EFTsim (payment simulators for ATM, Host, HSM, etc.).
- The EFTsim Development Tools modules (which appear to have superseded the legacy BP-Tools suite) can be purchased separately as a package for $999 USD. Purchases are handled via an enquiry form on their tutorials page.
EFTlab still actively maintains an extensive library of
free tutorials on every aspect of BP-CCALC usage at
https://www.eftlab.com/tutorials. These guides are up-to-date in format and include step-by-step examples with screenshots and log outputs, making them valuable even if you do not have the tool.
Recommended Official Ways to Obtain It
- Direct Contact with EFTlab (strongly recommended safest route):
- Fill out the contact form at: https://www.eftlab.com/contact-us (or the Australian variant https://www.eftlab.com.au/contact-us).
- Email: info@eftlab.com.au (primary) or use legacy addresses if listed.
- Phone: +61 421 088 162 (listed in partner directories).
- In your message, clearly state: You are a payment industry developer seeking the legacy BP-Tools suite / BP-CCALC (bp-ccalc.exe) for cryptographic/EMV development work. Mention any specific use case (e.g., EMV cryptogram calculation, key management). They typically respond within 24 hours.
- Older Archived Version (limited utility):
- SourceForge project: https://sourceforge.net/projects/bptools/ – Very outdated (~2015 era, pre-version 14.x). No files are currently listed for direct download, but historical archives may still exist in some mirrors. Licensed under Creative Commons Attribution-ShareAlike 3.0.
Third-Party and Unofficial Sources (Use at Your Own Extreme Risk)
Various aggregator sites (Software Informer, FreeDownloadManager, UpdateStar) list BP-Tools versions up to 14.08 (as of early 2026) and claim to offer downloads, but they redirect to or mirror the developer’s site, which no longer hosts the files. These are
not official and often bundle adware or outdated installers.
Newer unofficial builds (e.g., version 20.xx, 21.06-824) have been shared on forums like Reddit (/r/PaymentProcessing) via MediaFire links or similar. A 2025 carder.market thread even references “20.04 or newer (2025 compatible)”. Hybrid Analysis has scanned samples like bp-tools-20.08-1591-master-738c24f.exe (26 MiB Windows PE executable).
I cannot overstate the risk: This is a cryptographic tool that processes sensitive keys, PINs, and card data. Downloading from untrusted sources risks malware, backdoors, key-loggers, or tampered binaries that could compromise your entire development environment or even production keys. Always scan any file with multiple antivirus engines (VirusTotal) and run in a sandboxed VM if you must test one.
Alternatives If You Cannot Obtain the Official Tool
- Online calculators: emvlab.org (excellent for EMV cryptograms, ARQC, session keys); paymentcardtools.com (basic crypto and binary operations).
- Scripting: Python libraries (pycryptodome, emvpy, etc.) or open-source equivalents can replicate most functions.
- Commercial replacements: EFTlab’s own EFTsim ($999 package), or tools from Thales, UL/Underwriters Laboratories, or other payment testing vendors.
- Free/open-source options: Various GitHub repos for EMV calculators, though none match BP-CCALC’s polished GUI and comprehensive coverage.
If you provide more context about your specific use case (e.g., EMV ARQC generation, PIN encryption, key derivation, ISO 8583 parsing, or a particular card scheme), I can point you to the exact tutorial, suggest a Python workaround, or recommend the most relevant alternative tool. EFTlab’s support team is known for being responsive to legitimate industry inquiries, so reaching out directly remains the best path for the genuine, up-to-date version.
Let me know how else I can assist!