1. wolfTPM can run on resource constrained MCU, Embedded Systems and devices (IoT, Edge) 2. wolfTPM can be used in Trusted Execution Environments(TEE) and ARM TrustZone 3. wolfTPM does not have external dependencies 4. wolfTPM is the only open-source TPM2.0 stack that can be used in bare metal firmware 4.1 For industrial products using superloop […]
Read MoreMore TagCategory: Uncategorized
wolfCrypt on CMVP Implementation Under Test List
wolfCrypt has been listed on the CMVP IUT List for FIPS 140-3! We are currently working with our testing lab to get validated as quickly as possible with the new FIPS standard from the NIST. Among the changes for FIPS 140-3 are conditional algorithm self-tests, where the algorithm self-tests are only performed if used. The […]
Read MoreMore TagAvionics Systems in Need of New Cybersecurity Testing
The U.S. Government Accountability Office (GAO) has pushed for further guidelines and regulations to ensure security in Avionics Systems. The report indicates potential cyber risks such as data spoofing, outdated systems, long update cycles, and software vulnerabilities. Researches have also highlighted the vulnerabilities to in-flight connectivity systems including the usage of cheap equipment to eavesdrop […]
Read MoreMore TagSecure wolfMQTT SN with wolfSSL DTLS
The sensor network sub-specification of MQTT does not designate a method for securing the communication between the clients and the gateway. We here at wolfSSL think that is unacceptable! Using the DTLS library of wolfSSL, we would like to protect the sensor data all the way from the client to the gateway, and then from […]
Read MoreMore TagcURL TPM/HSM Integration
Dear Internet, Would you love to have cURL integrated into your TPM/HSM for enhanced security? Tell us what makes sense! If you have any questions or run into any issues, contact us at facts@wolfssl.com, or call us at +1 425 245 8247. Your’s truly, wolfSSL
Read MoreMore TagUsing wolfSSL with .NET Core
.NET Core is a .NET implementation that is preferred in situations where cross platform portability is important. Including use in containers and running on environments such as macOS and Linux. wolfSSL has a C# wrapper written for the .NET framework that is fully capable of performing TLS/DTLS connections while using the optimized C code with hardware […]
Read MoreMore TagWhat’s New in FIPS 140-3?
There are a few significant changes coming with FIPS 140-3. Over the years with many specification updates, a few things got a little inconsistent, so these inconsistencies have been brought back in line. wolfSSL is prepared to deliver the first and best implementation of FIPS 140-3, so get ready: The power-on self-test is changing. It […]
Read MoreMore TagwolfSSL-NXP Partnership Roundup
NXP® Semiconductors N.V. is one of the wolfSSL partner network members. wolfSSL ships with support for offloading cryptographic operations onto several NXP devices (such as the Coldfire and Kinetis) that include hardware cryptography modules. Examples of these operations include utilizing the Crypto Acceleration Unit (CAU), Memory-Mapped Crypto Acceleration Unit (mmCAU), LP Trusted Crypto (LTC), and […]
Read MoreMore TagUpcoming Partner Webinar with iWave
We are thrilled to announce a partner webinar with iWave! wolfSSL and iWave have partnered together to enable embedded TLS in the iWave portfolio of embedded solutions. iWave is a global embedded solution provider that offers a wide array of rugged and high-performance System on Modules (SoMs) and Single Board Computers (SBCs) build on NXP […]
Read MoreMore TagUpcoming Webinar: wolfSSL for STM32CubeMXv6
Watch the webinar: wolfSSL for STM32CubeMXv6! Join us for a 1-hour webinar to learn how wolfSSL & ST can easily integrate in STM32CubeMX projects. You will learn: New features of the latest STM32CubeMX tool from ST How wolfSSL embedded security features set users ahead of the pack with speed, portability and feature set How to […]
Read MoreMore Tag
