RECENT BLOG NEWS

So, what’s new at wolfSSL? Take a look below to check out the most recent news, or sign up to receive weekly email notifications containing the latest news from wolfSSL. wolfSSL also has a support-specific blog page dedicated to answering some of the more commonly received support questions.

Level of Security provided in ChaCha20-Poly1305 AEAD

Have you heard about the recent ChaCha20-Poly1305 AEAD and are wondering about how secure it is? It`s comprised of two ciphers, ChaCha20 and Poly1305, that are designed to be constant time, making it naturally resistant to timing attacks. The AEAD is being used by many notable companies that also trust it for their security – […]

Read MoreMore Tag

wolfSSL Unaffected by Recent OpenSSL Security Fixes

OpenSSL released a security advisory on June 11th 2015: https://www.openssl.org/news/secadv_20150611.txt.  Some wolfSSL embedded TLS users are probably wondering if similar security fixes are needed in wolfSSL.  The answer to that is no.  Specifically, CVE-2015-1788 – 1792 and CVE-2014-8176 are OpenSSL implementation bugs.  Since wolfSSL and CyaSSL embedded SSL libraries have a completely different code base […]

Read MoreMore Tag

FIPS 186-4 KeyGen

To support our customers pursuing FIPS 140-2 validations or Common Criteria evaluations, wolfSSL is adding FIPS 186-4 KeyGen to our next FIPS 140-2 validation.  We are scheduled to complete CAVP algorithm testing in June and testing with our FIPS Laboratory in July. Please contact wolfSSL at fips@wolfssl.com if you need a tested implementation of FIPS […]

Read MoreMore Tag

wolfSSL JNI 1.2.0 Released

Version 1.2.0 of wolfSSL JNI is now available for download. wolfSSL JNI provides Java applications with a convenient Java API to the widely-used wolfSSL embedded SSL/TLS library, including support for TLS 1.2 and DTLS 1.2. This release contains bug fixes and features including: – Updated support for wolfSSL 3.4.6 and CyaSSL to wolfSSL name change […]

Read MoreMore Tag

SP 800-90A Health Testing Mandatory for FIPS 140-2 Cryptographic Modules

Effective immediately, FIPS Testing Laboratories must verify that cryptographic modules implement the health testing described in SP 800-90A (Section 11.3). The wolfCrypt FIPS 140-2 Cryptographic Module (currently in “Coordination” at the CMVP) implements the health testing for the SP 800-90A Hash_DRBG.   Cryptographic modules that do not include health testing will be placed on “HOLD” […]

Read MoreMore Tag

wolfSSL Increases Crypto Performance

“wolfSSL uses Intel`s extended instructions to accelerate crypto algorithms for IoT. wolfSSL, an open source SSL/TLS security company has optimized the wolfSSL Transport Layer Security (TLS) library on 5th generation Intel® Core™ processors. With the inclusion of Intel’s extended instructions developers can use the wolfSSL libraries for applications on many devices, including embedded technologies. The […]

Read MoreMore Tag

Android Kerberos with FIPS 140-2 Crypto

Hi! A few years ago we collaborated with the MIT Kerberos team to port Kerberos to Android with wolfCrypt as the crypto engine. We have recently worked to get our wolfCrypt product FIPS 140-2 certified, and as such, can make a FIPS 140-2 version of Kerberos available to the market on Android and other platforms. […]

Read MoreMore Tag

Intel’s Extended Instructions Accelerates Hash Algorithms

Curious about how new machine instructions can accelerate crypto algorithms?  Most recently we added Intel’s Advanced Vector Extensions (AVX1 and 2) to wolfSSL’s secure hash algorithms.  Benchmarks show it improves the performance of SHA-256, 384 and 512 up to 75% (See: figure below).  Intel`s AVX1/2 allows 128bit/256bit registers to perform multiple word operations with a […]

Read MoreMore Tag

What is a Stream Cipher?

A stream cipher encrypts plaintext messages by applying an encryption algorithm with a pseudorandom cipher digit stream (keystream). Each bit of the message is encrypted one by one with the corresponding keystream digit. Stream ciphers are typically used in cases where speed and simplicity are both requirements. If a 128 bit block cipher such as […]

Read MoreMore Tag

Posts navigation

1 2 3 174 175 176 177 178 179 180 215 216 217

Weekly updates

Archives