How to use the CTaoCrypt crypto library in standalone mode

Hi!  About 20% of our users are using CTaoCrypt to provide standalone cryptographic functionality, and about 80% of our users have not thought about using it that way.  The purpose of this blog post is to inform users on how to use CTaoCrypt as a standalone library:
1. CTaoCrypt is available as a function set within wolfSSL, licensed under GPL or commercially.  If you are interested in using it outside of wolfSSL, then let us know.  Basically this means that 100% of the CTaoCrypt functions are available through the wolfSSL API set. 
2. Support for various development environments is included in the download, including GCC, Visual Studio, and Xcode.
3. The build process is described in the README.  A program to test your build is included.
4. If you are a benchmark junkie, and since we know you probably are, we include a simple benchmark application to get you started.
5. CTaoCrypt has a lot of useful features, including: 

– AES-NI support for super fast AES on the newer intel chips. 
– One way hash functions: SHA-1, MD2, MD4, MD5, RIPEMD-160
– Message authentication codes: HMAC
– Block Ciphers: DES, Triple-DES, AES
– Stream Ciphers: ARC4, Rabbit and HC-128
– Public Key Crypto: RSA, DSA, Diffie-Hellman
– Password based key derivation: PBKDF2 from PKCS #5
– Pseudo Random Number Generators
– Large Integer Support
– Base 16/64 encoding/decoding
– DER encoding/decoding
– X.509 processing
– x86, x86_64, SSE2, ARM, PPC32, and PPC64 and AVR32
– Support for FastMath

6. If you need porting, support, or just regular help with CTaoCrypt, then get in contact with us at

SHODAN:  Sentient Hyper-Optimized Data Access Network automates port scanning, simplifies exploiting embedded devices

“The Register” reported on using SHODAN to pinpoint embedded devices that are not properly secured yesterday.  See for details.  In summary, SHODAN can be used to quickly identify internet connected devices with known exploits.  For us, it points to yet another reason why mobile and embedded systems developers should harden their devices with the wolfSSL embedded SSL library and the yaSSL Embedded Web Server.

Posts navigation

1 2