A recent paper titled “Exploiting Dissent: Towards Fuzzing-based Differential Black-Box Testing of TLS Implementations” was published by Axel Sikora and Andreas Walz. wolfSSL found the paper both well composed and informative. We would like to congratulate Andreas and Axel on a well composed piece of literature and we would highly recommend reading it if you […]
Read MoreMore TagCategory: Uncategorized
TLS-Attacker, making the online world a safer place!
wolfSSL has a goal: “wolfSSL will provide the best security in the world for all to benefit”! We are very passionate about keeping our users safe and secure in an increasingly connected online world. To that end the wolfSSL product is the most thoroughly tested cryptography and TLS solution on the market today. wolfSSL appreciates […]
Read MoreMore TagwolfSSL 3.12.2 Now Available
wolfSSL 3.12.2 is now available for download! This release includes many performance improvements with Intel ASM (AVX/AVX2) and AES-NI. wolfSSL has implemented a new single precision math option to speed up RSA, DH and ECC in this release. Embedded hardware support has been expanded for STM32, PIC32MZ and ATECC508A, and AES-XTS mode support has been […]
Read MoreMore TagEmbedded SSL/TLS in the Holiday Spirit
Team wolfSSL is preparing for Halloween with a pumpkin carving! Our embedded security products are continually evolving. We encourage you to check our our wolfSSL embedded SSL/TLS library here, wolfMQTT, wolfSSH, or visit our product page for a complete list of lightweight Open Source security products. As always if you have any questions, or would […]
Read MoreMore TagALT_ECC_SIZE, low visibility but highly useful!
It recently came to our attention that the preprocessor macro ALT_ECC_SIZE was missing in our documentation. As a result we decided to post a blog about this to help inform customers of the value for using this in space constrained devices using the fastmath math library with RSA/DH and ECC in wolfSSL. ALT_ECC_SIZE: The fastmath […]
Read MoreMore TagBreaking Ed25519 paper using wolfSSL
A recent paper used wolfSSL as a test bed for proving out their attack on Ed25519 signatures. You can read the paper here: https://eprint.iacr.org/2017/985.pdf . This was not an attack on wolfSSL itself or its implementation, but rather a differential power attack that involves SHA-512 and Ed25519. The recommended countermeasure is to change Ed25519 and […]
Read MoreMore TagKRACK Attacks: Wi-Fi Security Has Been Breached
According to a recent article, researchers have announced that Wi-Fi security has a protocol level exploit that can render all Wi-Fi traffic vulnerable to sniffing or manipulation. The good news is that if you are already using an independent form of end-to-end encryption such as SSL/TLS then the stolen packets are of little use as […]
Read MoreMore TagwolfSSL Intel SGX Testing
wolfSSL has support for Intel SGX and we do continuous integration testing on that support. This means that every night a process starts up and runs unit tests on crypto operations in a secure Enclave. Here’s a peek at some of the on going tests in action… LINK => App GEN => trusted/Wolfssl_Enclave_t.c CC <= […]
Read MoreMore TagwolfSSL with Improved ThreadX/NetX Support
wolfSSL has supported the ThreadX/NetX RTOS with the TLS protocol. Recently we added the ability to use DTLS with NetX. Out of the box, wolfSSL has the I/O callback functions for handling UDP packets for DTLS. As an extension to DTLS, wolfSSL also supports Multicast DTLS. If you would like to know more please contact our sales team […]
Read MoreMore TagHow to use the 0-RTT rope to climb, without hanging yourself!
One of the major new features of TLS v1.3 is the 0-RTT handshake protocol. This variation of the handshake, using Pre-Shared Keys (PSKs), allows the client to send encrypted data to the server in the first flight. This is particularly useful for TLS on embedded devices. Take the example of IoT. There may be thousands […]
Read MoreMore Tag
