If working on a memory constrained device we now have memory optimized Ed25519 and Curve25519 options. This can be enabled with using the configure setting “./configure –enable-ed25519=small –enable-curve25519=small –enable-sha512”. The new feature allows for a trade off in memory usage versus speed. All of the operations in the memory optimized build, except for SHA-512, use […]
Read MoreMore TagMonth: June 2015
Expert Interview: Is the future of wearables now?
Larry Stefonic, our CEO, was recently interviewed by TechnologyAdvice on the future of wearables: an important space for embedded SSL/TLS and cryptography. With the advent of the Internet of Things we are increasingly using connected devices throughout our day. Unsecured, these devices leave us vulnerable in ways not even imaginable 20 years ago. Larry talks […]
Read MoreMore TagwolfSSL Inc Partners with Freescale to Deliver Advanced, High Performance IoT Security Solutions, Complete with Embedded SSL and Hardware Based Encryption
“wolfSSL enables Freescale`s hardware encryption for embedded tls, embedded cryptography, and the IoT” wolfSSL Inc, the most popular embedded SSL, cryptography, and FIPS 140-2 provider for the IoT, has partnered with Freescale to deliver high performance, hardware enabled cryptography for Freescale`s MQX RTOS on the Kinetis platform. The hardware cryptography is enabled through wolfSSL`s well […]
Read MoreMore TagwolfSSL 3.6.0 Released
The new release of the wolfSSL embedded SSL library has bug fixes and new features including: – Max Strength build that only allows TLSv1.2, AEAD ciphers, and PFS (Perfect Forward Secrecy). With –enable-maxstrength.– Server side session ticket support, the example server and echoserver use the example callback myTicketEncCb(), see wolfSSL_CTX_set_TicketEncCb().– FIPS version submitted for iOS.– […]
Read MoreMore TagLevel of Security provided in ChaCha20-Poly1305 AEAD
Have you heard about the recent ChaCha20-Poly1305 AEAD and are wondering about how secure it is? It`s comprised of two ciphers, ChaCha20 and Poly1305, that are designed to be constant time, making it naturally resistant to timing attacks. The AEAD is being used by many notable companies that also trust it for their security – […]
Read MoreMore TagwolfSSL Unaffected by Recent OpenSSL Security Fixes
OpenSSL released a security advisory on June 11th 2015: https://www.openssl.org/news/secadv_20150611.txt. Some wolfSSL embedded TLS users are probably wondering if similar security fixes are needed in wolfSSL. The answer to that is no. Specifically, CVE-2015-1788 – 1792 and CVE-2014-8176 are OpenSSL implementation bugs. Since wolfSSL and CyaSSL embedded SSL libraries have a completely different code base […]
Read MoreMore TagFIPS 186-4 KeyGen
To support our customers pursuing FIPS 140-2 validations or Common Criteria evaluations, wolfSSL is adding FIPS 186-4 KeyGen to our next FIPS 140-2 validation. We are scheduled to complete CAVP algorithm testing in June and testing with our FIPS Laboratory in July. Please contact wolfSSL at fips@wolfssl.com if you need a tested implementation of FIPS […]
Read MoreMore TagwolfSSL JNI 1.2.0 Released
Version 1.2.0 of wolfSSL JNI is now available for download. wolfSSL JNI provides Java applications with a convenient Java API to the widely-used wolfSSL embedded SSL/TLS library, including support for TLS 1.2 and DTLS 1.2. This release contains bug fixes and features including: – Updated support for wolfSSL 3.4.6 and CyaSSL to wolfSSL name change […]
Read MoreMore TagSP 800-90A Health Testing Mandatory for FIPS 140-2 Cryptographic Modules
Effective immediately, FIPS Testing Laboratories must verify that cryptographic modules implement the health testing described in SP 800-90A (Section 11.3). The wolfCrypt FIPS 140-2 Cryptographic Module (currently in “Coordination” at the CMVP) implements the health testing for the SP 800-90A Hash_DRBG. Cryptographic modules that do not include health testing will be placed on “HOLD” […]
Read MoreMore Tag
