Cipher Suite Strength and Choosing Proper Key Sizes

Cipher suites come in a variety of strengths.  Because they are made up of several different types of algorithms (authentication, encryption, and message authentication code (MAC)), the strength of each varies with the chosen key sizes.  There can be many methods of grading the strength of a cipher suite – the specific method used seems […]

Read MoreMore Tag

Our News Feed RSS is Changing

Hi! We`ve been making several changes to our website lately which we plan to roll out in the near future. One of the things we`re doing is changing the name of our “News” feed to a “Blog” feed. We thought that we better keep up with the times and start using the correct terminology. As […]

Read MoreMore Tag

wolfSSL 2.0 New Features – Part 4

Here`s the fourth part in a four part series giving a more detailed report on some of the new features present in the recent wolfSSL release. • Shared build only by default.  wolfSSL used to build in shared mode and static mode by default, somewhat handy, but twice as time consuming.  Now, wolfSSL will only […]

Read MoreMore Tag

World IPv6 Day

June 8, 2011 (this Wednesday) is World IPv6 Day, a day that several major organizations will offer content over IPv6 during a 24-hour time period. As stated on the ISOC website, “the goal of the test flight day is to motivate organizations across the industry – Internet service providers, hardware makers, operating system vendors and […]

Read MoreMore Tag

wolfSSL 2.0 rc2 Release

The 2nd and possible final release candidate for wolfSSL 2.0 is now available.  This release contains bug fixes for Alert processing and DTLS with DHE.  New features include: – FreeRTOS support– lwIP support– Wshadow warnings removed– ctc_ prefix for CTaoCrypt headers (manual still being updated for this)– asn public header for better collision avoidance Stay […]

Read MoreMore Tag