After a long and arduous journey, NIST has finally released the draft standards for 3 post-quantum algorithms: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.ipd.pdf https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.204.ipd.pdf https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.205.ipd.pdf Let’s talk a little bit about each of the documents one by one. FIPS-203 specifies ML-KEM which was based on the NIST Post-Quantum Competition’s only KEM winner Kyber. ML-KEM stands for Module Lattice-based Key Encapsulation […]
Read MoreMore TagCategory: Uncategorized
Post-Quantum Script Magician: Igor Barshteyn
Today we’d like to give a quick shout out to Igor Barshteyn! He is a long time and active member of the cryptography and information security communities. His interests are very apparent in his posts on LinkedIn. Besides sleuthing out the the NIST post-quantum draft standards the day before their release and a multitude of […]
Read MoreMore TagLive Webinar: Reasons to Migrate from OpenSSL to wolfSSL
Are you seeking a superior alternative to OpenSSL with better support and smoother workflow? wolfSSL can fulfill your needs, addressing the gaps you might be experiencing while using OpenSSL. Join our upcoming webinar hosted by wolfSSL engineer Anthony, where he will focus on advantages of switching to wolfSSL. Discover why choosing wolfSSL over OpenSSL can […]
Read MoreMore TagBenchmarking wolfCrypt on Cortex M0+
We added a benchmark running on Raspberry Pi PIco-W. It runs with Cortex M0+, 125MHz. If you are interested in how wolfSSL/wolfCrypt works on low end MCU, this should be a good example benchmark to look into. Here are some highlights: Hash operations such as SHA256 run faster than 1 M bytes per second. Symmetric […]
Read MoreMore TagDTLS Support Added to wolfMQTT-SN
wolfSSL is delighted to announce that we have added a secure way for sensors to communicate to the gateway using DTLS and MQTT-SN! We used the Paho MQTT-SN Gateway project’s recent addition of DTLS support for testing. Testing details are in the pull request. Let us know what you think by sending a note to […]
Read MoreMore TagLive Webinar: SM ciphers are implemented in wolfSSL
Join the webinar to discover how the latest SM cipher implementations from wolfSSL comply with Chinese regulations and can secure your critical systems! wolfSSL engineer Sean will reveal all the details to help you find the best solutions for your critical systems on September 7th at 2pm PT. Watch the webinar here: SM ciphers are […]
Read MoreMore TagEvery hardware cryptography scheme wolfSSL has ever enabled
At wolfSSL we support hardware cryptography for a wide range of platforms. The benefits of hardware cryptography include reduced code footprint size, improved security, acceleration of cryptographic operations, and utilization of true random number generators. For example, this allows everything from wolfBoot to TLS cipher suites to enjoy acceleration of cryptographic operations. Furthermore, we have […]
Read MoreMore TagwolfSSL on the Espressif ESP32-C3 RISC-V
More and more customers are asking about the Espressif ESP32 RISC-V SoC products. The answer is an enthusiastic YES. We support all of the Espressif ESP-32 chipsets, including the ESP32-C6 and the ESP32-C3 RISC-V devices. Check out our recent video: Getting Started with wolfSSL on the ESP32. Our Espressif examples make it easier than ever […]
Read MoreMore TagIs my part supported?
If you are wondering if your part is supported by wolfSSL, the answer is “Yes!!” That said, what follows is an abbreviated incomplete list sorted by manufacturer: Note: no matter how hard we try to make these lists, they will never be complete because the week after the list is made, there will be more […]
Read MoreMore TagAnnouncing wolfSSL sniffer support for key log files (SSLKEYLOGFILE)
We are excited to announce that the wolfSSL sniffer now supports TLS session decryption for recorded TLS traffic using a SSLKEYLOGFILE! If you didn’t already know about our sniffer tool, it is a utility library built into wolfSSL that can be used to capture and decrypt live traffic or recorded PCAP traces. Previously, the sniffer […]
Read MoreMore Tag
