We are adding wolfBoot support for the new STM32C0. This is a low cost MCU similar to the STM32G0 based on a Cortex-M0 (48MHz). It is a very low cost general purpose 32-bit MCU with up to 32KB flash and 12KB RAM. Our wolfBoot secure bootloader is the only solution available for this platform thanks […]
Read MoreMore TagMonth: January 2023
KEMTLS Experimentation Via wolfSSL
A new, exciting paper has been released by Ruben Gonzalez from Neodyme AG and Thom Wiggers from Radboud University. They compare post-quantum algorithms in TLS 1.3 and KEMTLS. KEMTLS is a newly proposed modification to the TLS 1.3 protocol that would eliminate the need for signing operations during a handshake protocol. Note that a long […]
Read MoreMore TagwolfEngine 1.3.0 Released
We’re happy to announce that wolfEngine 1.3.0 has been released! wolfEngine is an OpenSSL engine implementation that helps users migrate to a FIPS-validated cryptography library (wolfCrypt) all while continuing to use OpenSSL. Version 1.3.0 includes support for RPM packaging, support and tests for OpenSSL HMAC operations to be called with a -1 key length, and […]
Read MoreMore TagRust Crate for Post-Quantum TLS 1.3 and wolfSSL
Are you on the bleeding edge of software development and cryptographic protocols? Then you’ll appreciate the work that our friends at ExpressVPN have done by creating a rust crate for wolfSSL with bindings into our API. They have even created a special feature flag called “postquantum” which enables our integration with liboqs. In fact, this […]
Read MoreMore TagDTLS 1.3 support for Post-Quantum Cryptography
Do you want to start using wolfSSL’s DTLS 1.3 implementation? Want to go even further? A great reason to start using our DTLS 1.3 stack is that it also supports post-quantum KEMs, Hybrid KEMs and post-quantum signature schemes. When it comes time to move to post-quantum standards, support for them will likely come in […]
Read MoreMore TagwolfSSL: Hardened By Default
In cryptography when we talk about hardening a library, we mean enabling resistance to timing attacks and cache attacks, using RSA blinding and protecting against glitching. Enabling and Disabling Our code has many related macros which can be controlled via configure script flags such as the harden flag and maxstrength flag. When hardening is enabled, […]
Read MoreMore TagwolfSSL + nuttX initial testing success!
wolfSSL is pleased to announce initial run-time testing of wolfCrypt + NuttX was successfully completed (Crypto algorithm tests and benchmarking) on both BL602 (RISC-V) and NUCLEO-L552ZE-Q (Cortex-M33) targets! wolfSSL engineers are now working on making a publically available drop-in for the NuttX-apps directory that users can take for a spin! The wolfSSL team is very […]
Read MoreMore Tag
