wolfSSL will be releasing wolfCrypt v4.0 FIPS with an expanded security boundary. We have added many algorithms to the boundary, including Key Generation. wolfCrypt v4.0 FIPS can generate keys for use with RSA and ECDSA signing. It can also do the perform the ECDHE and DHE key agreement schemes. We have also self-affirmed wolfCrypt for […]
Read MoreMore TagCategory: Uncategorized
SCP with wolfSSH
We have been hard at work adding server support for SCP to wolfSSH and it will be available in the next release of wolfSSH, version 1.3.0. If you have an embedded device and want to securely upload a new firmware image to it or download a log file with the convenience of a copy command, […]
Read MoreMore TagwolfSSL Release 3.15.0
wolfSSL is proud to announce release v3.15.0 of our wolfSSL embedded TLS library. Among the many additions are: Support for wolfCrypt FIPS on SGX Support for TLS 1.3 Draft versions Single Precision assembly code added for ARM and 64-bit ARM to enhance performance Improved performance for Single Precision maths on 32-bit Expanded OpenSSL compatibility layer […]
Read MoreMore TagwolfSSL Intel SGX (#SGX) + FIPS 140-2 (#FIPS140)!
wolfSSL is pleased to announce the following addition to the wolfSSL FIPS certificate! Debian 8.7.0 Intel ® Xeon® E3 Family with SGX support Intel®x64 Server System R1304SP Windows 10 Pro Intel ® Core TM i5 with SGX support Dell LatitudeTM 7480 The wolfCrypt FIPS validated cryptographic module has been validated while running inside an Intel […]
Read MoreMore TagPerformance Comparison: TLS 1.3 in wolfSSL and OpenSSL
The performance of TLS 1.3 using wolfSSL has recently been discussed here in the blogs. While checking our performance a comparison was made with OpenSSL. An OpenSSL server using the latest TLS 1.3 implementation at the time was used with the wolfSSL client. The numbers showed that the recent Intel x86 64-bit assembly optimizations have […]
Read MoreMore TagwolfSSL FAQ page
The wolfSSL FAQ page can be useful for information or general questions that need need answers immediately. It covers some of the most common questions that the support team receives, along with the support team’s responses. It’s a great resource for questions about wolfSSL, embedded TLS, and for solutions to problems getting started with wolfSSL. […]
Read MoreMore TagTLS 1.3 Performance Part 6 – Throughput
Some interesting results were found when comparing the throughput of TLS 1.2 and TLS 1.3 using an assembly optimized wolfSSL – some good, some bad. This is the last of the blogs discussing the performance differences observed between TLS 1.2 and TLS 1.3 in wolfSSL and how to make the most of them in your […]
Read MoreMore TagTLS 1.3 Performance Part 5 – Client-Server Authentication
TLS 1.3 has some significant changes from TLS 1.2 in the ordering of handshake messages and this impacts performance. This is the fifth part of six blogs discussing the performance differences observed between TLS 1.2 and TLS 1.3 in wolfSSL and how to make the most of them in your applications. This blog discusses how […]
Read MoreMore TagwolfSSL Competitive Upgrade Program
One of the services that wolfSSL provides is the wolfSSL Competitive Upgrade Program. With this program, wolfSSL offer competitive upgrade pricing for those who wish move from an outdated or expensive SSL/TLS library to wolfSSL with low cost and minimal disturbance to their code base. Here’s an outline of the Competitive Upgrade Program: You need […]
Read MoreMore TagTLS 1.3 Performance Part 4 – Server Pre-Generation
TLS 1.3 has some significant changes from TLS 1.2 that are targeted at performance. This is the fourth part of six blogs discussing the performance differences observed between TLS 1.2 and TLS 1.3 in wolfSSL and how to make the most of them in your applications. This blog discusses the server generating a key pair […]
Read MoreMore Tag
