Hi! If you`re interested in smart grid security, and specifically the security required when connecting an electric car to the smart grid, this post is for you! wolfSSL has recently been supporting the development efforts of eNterop (as of 26 March 2018 at 9:30m MDT, this link no longer works and has no alternative), which is […]
Read MoreMore TagCategory: Uncategorized
wolfSSL 2013 Annual Report
2013 was an interesting year in the world of cryptography and computer security. We have seen and mitigated against attacks such as Lucky13 and watched with interest as existing technologies such as Dual_EC_DRBG have become widely regarded as insecure. wolfSSL has been happy to provide our users with timely fixes, suggestions, and new technologies to […]
Read MoreMore TagSoftware Defined Networking and CyaSSL
Hi! Someone told us the other day that Software Defined Networking (SDN) is stupid. No way will SDN ever replace the high end networking gear, we were told. We were reminded of a scientific study that proved unequivocally that babies are stupid, courtesy of The Onion. But of course babies grow, and eventually have much greater […]
Read MoreMore TagTechnologies and Techniques for Securing Connected Devices
wolfSSL will be presenting a session titled “Technologies and Techniques for Securing Connected Devices” at the upcoming 2014 Embedded World Conference in Nürnberg, Germany. If you are going to be attending the conference, we welcome you to come and listen to our presentation. Technologies and Techniques for Securing Connected DevicesSession: 17Day: 02.27.2014Time: 11:30am – 12:00pmSpeaker: […]
Read MoreMore TagUsing the MIT Kerberos GSS-API with wolfSSL on Android
Are you interested on using the GSS-API with Kerberos on Android? If so, you’ll be happy to hear about wolfSSL’s port of the MIT GSS-API library to Android platform – complete with an org.ietf.jgss (RFC 5653) compatible application programming interface, CyaSSL cryptography integration, and NDK sample application. You may have read our previous blog entries […]
Read MoreMore TagMore Dual_EC_DRBG News
It was reported yesterday in The Guardian and elsewhere that the NSA paid RSA $10M to set Dual_EC_DRBG as their default PRNG. See the news here: http://www.theguardian.com/world/2013/dec/20/nsa-internet-security-rsa-secret-10m-encryption. As we have previously stated, we never implemented Dual_EC_DRBG in any of our products, much less set it as default, because of its suspect nature. If you`re […]
Read MoreMore TagSSL/TLS and Cryptography Benchmarks
Some of our users have been wondering if we were doing benchmarks of our SSL and cryptography performance. Here are the results we have gathered so far: wolfSSL / CTaoCrypt Benchmarking.Let us know if we should do a different kind of benchmark at facts@wolfssl.com
Read MoreMore TagAssembly Optimizations Available in wolfSSL for ARM Processors
wolfSSL, as a long standing partner to ARM, has always been well optimized for ARM environments. One of the ways CyaSSL can be optimized for ARM platforms includes assembly optimizations for Public Key operations with the CTaoCrypt fastmath option. This translates to a speed increase when using RSA, Diffie-Hellman, DSA, or ECC. If you dive […]
Read MoreMore TagMore on we`re dumping SSL 3.0 support from wolfSSL
We`ve been encouraged by the feedback from the community on dropping SSL 3.0 support from wolfSSL, meaning that people think we should drop it as insecure and eliminate the legacy which goes back to 1996. Many thanks to Paul Kocher, Phil Karlton, Alan Freier, and the many shoulders they were standing on for designing the […]
Read MoreMore TagDumping SSL v3 from wolfSSL
Hi! We`re considering the elimination of SSL 3.0 support from wolfSSL. There`s a lot of reasons to do it, including better security, cleaning up our code, and its time to move on and modernize. Anybody have an opinion? The code would still be available, but not mainline.
Read MoreMore Tag
