Delta Firmware Updates with wolfBoot

A quite unique feature of wolfBoot is the possibility to update the firmware using signed incremental updates. The mechanism relies on a delta algorithm that produces a small update package. Instead of transferring the entire binary image of the firmware update, incremental updates only contain the binary difference with the previous version. Distributing a new […]

Read MoreMore Tag

What is a Block Cipher?

A block cipher is an encryption method that applies a deterministic algorithm along with a symmetric key to encrypt a block of text, rather than encrypting one bit at a time as in stream ciphers. For example, a common block cipher, AES (Advanced Encryption Standard), encrypts 128 bit blocks with a key of predetermined length: […]

Read MoreMore Tag

TLS 1.3 IoT-SAFE with wolfSSL

IoT-SAFE, IoT SIM Applet For Secure End-to-End Communication, is a standard mechanism, based on the use of SIM cards (both physical SIM and ESIM) as Root-of-Trust to secure applications and services running on embedded systems connected through the mobile network. IoT-SAFE is standardized and promoted by GSMA, and is currently being implemented in the mobile market […]

Read MoreMore Tag

Differences Between TPM 1.2 and TPM 2.0

With the release of wolfTPM, it may be useful to understand the differences and benefits of TPM 1.2 and TPM 2.0. The table below outlines some of the differences/similarities between TPM 1.2 and TPM 2.0 in a side-by-side comparison. TPM 1.2 TPM 2.0 One-size-fits-all specification consists of three parts Required algorithms: RSA-1024, RSA-2048; SHA-1 (hashing […]

Read MoreMore Tag

Live Webinar: wolfSentry

Are you concerned about the rising threats to your organization’s security? Looking for a robust and comprehensive cybersecurity solution? We’re thrilled to invite you to our upcoming webinar, where we will unveil the groundbreaking features of our product, WolfSentry. Watch the webinar here: Intro and update of wolfSentry wolfSSL engineer, Daniel Douzzer, will showcase how […]

Read MoreMore Tag

Entrust’s Cybersecurity Institute Podcast on Post-Quantum Cryptography’s Impact on Constrained Devices

Are you a thought leader in the world of embedded devices? If so, you will need to make yourself aware of the coming impacts of post-quantum cryptography and how it will affect the various industries and verticals that you participate in. Have a listen to Entrust’s Cybersecurity Institute’s second episode of the their post-quantum podcast […]

Read MoreMore Tag

STMicro and wolfBoot Video Series

We are excited to tell you about our partner collaboration with ST Micro! This collaboration is a video series about wolfBoot, a secure bootloader and the STM32, a family of 32-bit microcontrollers. This is a 4 part video series showing how to use wolfBoot on various STM32 microcontrollers. Video 1: wolfBoot for STM32, Part 1: […]

Read MoreMore Tag

wolfSSL Zephyr Port Update

We have updated our Zephyr support to 3.4 for wolfSSL release 5.6.2! Zephyr is an open-source real-time operating system (RTOS). It is portable (supporting over 450 boards!) and secure with a comprehensive and lightweight kernel. All of these features make wolfSSL a great choice for security in Zephyr. The port update comes with a set […]

Read MoreMore Tag

wolfSSL on the Xtensa ESP32-S3 Linux

With our ongoing development of world-class commercial-grade cryptography solutions for the Espressif products, wolfSSL is proud to announce support for the ESP32-S3 Embedded Linux Kernel! Our very own [gojimmypi] was able to get the wolfSSL wolfcrypt tests running successfully as an app on the embedded Linux environment thanks to the work of [jcmvbkbc] on linux-xtensa. […]

Read MoreMore Tag

Posts navigation

1 2 3 64 65 66 67 68 69 70 216 217 218