Camellia Cipher Now Available in wolfSSL

We have added the Camellia-CBC cipher to CTaoCrypt and wolfSSL. The following cipher suites are available for TLS: • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 Camllia-CBC will be available in our next release. The latest sources are available in our GitHub repository. To enable Camellia-CBC in […]

Read MoreMore Tag

Updated API Documentation

We want to let our users and followers know that we recently updated the API documentation for the wolfSSL embedded SSL library. With this update, all functions in the standard wolfSSL build (98) are now documented plus an additional 19 related to various defines related to DTLS, Callbacks, DER-specific, NTRU or OpenSSL extra functions. You […]

Read MoreMore Tag

wolfSSL Now Supports AES with CCM-8

We have added the Counter with CBC-MAC Mode with 8?byte authentication (CCM-8) for AES to wolfSSL. The following cipher suites are available for TLS v1.2: • TLS_RSA_WITH_AES_256_CCM_8_SHA384 • TLS_RSA_WITH_AES_128_CCM_8_SHA256 AES with CCM-8 will be available in our next release. The latest sources are available in our GitHub repository. To enable AES with CCM-8 in wolfSSL, configure […]

Read MoreMore Tag

Getting started with wolfSSL`s ECC

Release 2.4.6 of wolfSSL is the first to include our ECC implementation publicly.  Let`s look at how to get started using the ECC features.  First, you`ll need to turn on ECC.  With the autoconf system this is simply a configure flag: ./configure –enable-eccmakemake check Note the 96 different TLS cipher suites that make check verifies. […]

Read MoreMore Tag

Linux Journal – Elliptic Curve Cryptography

If you are a reader of Linux Journal (http://www.linuxjournal.com/), you may have seen the interesting article in this month’s issue about Elliptic Curve Cryptography written by Joe Hendrix: http://www.linuxjournal.com/content/january-2013-issue-linux-journal-security In the article, Joe explains how ECC works (with several descriptive charts), talks about how NIST makes recommendations on the actual security provided by different algorithms […]

Read MoreMore Tag