VeraCrypt with wolfCrypt backend

wolfSSL makes a great effort to support a variety of open-source projects and the latest addition to the list is the disk encryption utility, VeraCrypt. With our recent porting effort, users will be able to leverage the VeraCrypt application with our cutting-edge crypto library, wolfCrypt. VeraCrypt is packed with highly customizable security features employed to […]

Read MoreMore Tag

Announcing wolfProvider!

Here at wolfSSL, we’ve got a new product that should interest you! We love it when we can help make potentially painful decisions easier for our customers. Have you switched over to the 3.x series of releases on OpenSSL? It was likely a very large investment in time and human resources, but you needed to […]

Read MoreMore Tag

wolfCrypt now supports AES EAX

We are excited to announce that wolfCrypt now supports the EAX mode of operation for AES! AES EAX is a two-pass authenticated encryption scheme that is optimized for simplicity and efficiency. More details about the algorithm can be found in EAX: A Conventional Authenticated-Encryption Mode, by M. Bellare, P. Rogaway, and D. Wagner. To enable […]

Read MoreMore Tag

Live Webinar: FIPS Training

The FIPS Training Webinar returns on October 12th at 10 AM PT, presented by wolfSSL Senior Software Engineer Kaleb. Join us for an exciting opportunity to enhance your understanding of FIPS and gain valuable insights into its implementation from wolfSSL as the current leader in embedded FIPS certificates. Watch the webinar here: FIPS Training Webinar […]

Read MoreMore Tag

Some Differences Between TLS and SSH

TLS provides end-to-end encryption on one connection. You are routing data in and out from one application. (Note, this application can be a tunneling utility, see Stunnel.) It authenticates the server with a certificate chain of trust going back to a root CA that you implicitly trust to sign identities. It can authenticate the client […]

Read MoreMore Tag

wolfTPM Policy PCR Sealing

When it comes to edge computing devices, keeping secrets such as encryption keys or identifiable metadata from being tampered with or stolen is of the utmost importance and the TPM is an ideal facility for keeping such secrets. WolfTPM already has facilities for storing secrets to the TPM, but we’ve recently added convenience functions for […]

Read MoreMore Tag

Posts navigation

1 2 3