CPU-Accelerated Cryptography on OpenWRT Using wolfSSL

OpenWRT is a customizable open-source firmware for wireless routers and embedded devices, offering extensive flexibility and control over network configurations. For those looking to enhance their device’s security capabilities with efficient cryptographic operations, integrating wolfSSL with CPU acceleration presents an excellent option. This setup is optimized for devices compatible with x86 and armv8 architectures, ensuring […]

Read MoreMore Tag

Comparing wolfSSL vs OpenSSL

How does OpenSSL Compare with wolfSSL? There are a lot of different metrics to compare when choosing between two TLS libraries. Some of those include heap usage and performance. Heap Usage: For heap usage wolfSSL can be significantly smaller — using 100’s of kilobytes less to handle an incoming TLS connection. The following is comparisons […]

Read MoreMore Tag

wolfSSL SSL/TLS Support for NXP SE050

The wolfSSL lightweight SSL/TLS library and underlying wolfCrypt cryptography library have included support for the NXP SE050 module since November 2021. Since that time we have been increasing compatibility with SE050 along with usage of SCP03 (Secure Channel Protocol 03) authentication. To help users get started with TLS usage, we also have two example client […]

Read MoreMore Tag

Live Webinar: wolfHSM – wolfSSL and Automotive Hardware Security Modules (HSMs)

Welcome! Join us for one of our most popular wolfSSL webinars, “wolfHSM: wolfSSL and Automotive Hardware Security Modules (HSMs)” scheduled for February 22nd at 10am PT, presented by wolfSSL Software Engineer, Bill. As vehicles have evolved into digital systems over the years, evaluating automotive cybersecurity has become a key aspect of automotive safety. Watch the […]

Read MoreMore Tag

Post-Quantum Hybrid Solutions

Here at wolfSSL, when it comes to post-quantum algorithms, we are careful to provide conservative approaches. We are aware that these algorithms are new and developments are still on-going as cryptographers continue analyzing these algorithms. As such, we always encourage hybridizing with conventional algorithms. Here are the hybrids we offer: Hybrid Key exchange via concatenation […]

Read MoreMore Tag

Posts navigation

1 2