Doing FIPS responsibly since 2014! The wolfCrypt module now holds the world’s first SP800-140Br1 FIPS 140-3 Validated Certificate #4718. INTRO (wolfSSL FIPS service(s)): (skip to next paragraph for “What is FIPS”) FIPS is rightly viewed as a complex process with a steep entry learning curve. Lucky for customers of wolfSSL Inc. our management and engineering […]
Read MoreMore TagMonth: August 2024
wolfSSL Invited to the White House Post-Quantum Standards Announcement
Our very own Tim Pickering was in attendance today when White House officials announced that the standards for post-quantum algorithms were no longer in draft mode. They are now fully empowered as standard algorithms and endorsed by the US Federal Government. What was standardized today? FIPS-203 ML-KEM FIPS-204 ML-DSA FIPS-205 SLH-DSA Here at wolfSSL we’ve […]
Read MoreMore TagKeystores and Secure Elements supported by wolfSSL
When looking to store your cryptographic secrets, it is important to have a good platform to store them on. Even more important is the ease of accessing and using those secrets. With wolfTPM, we have support for all TPM 2.0 APIs. Additionally, we provide the following wrappers: Key Generation/Loading RSA encrypt/decrypt ECC sign/verify ECDH NV […]
Read MoreMore TagwolfSSL Invited to the White House Post-Quantum Standards Announcement
Our very own Tim Pickering was in attendance today when White House officials announced that the standards for post-quantum algorithms were no longer in draft mode. They are now fully empowered as standard algorithms and endorsed by the US Federal Government. What was standardized today? FIPS-203 ML-KEM FIPS-204 ML-DSA FIPS-205 SLH-DSA Here at wolfSSL we’ve […]
Read MoreMore TagHow do you benchmark cryptography?
There are many different metrics that can be used when benchmarking cryptography. The common metrics are; average time per operation, average amount of data processed per unit of time, and number of clock cycles taken per data processed. The first metric of average time per operation, is used with asymmetric key algorithms. These are algorithms […]
Read MoreMore TagLive Webinar: Getting Started with libcurl
Join us for an insightful live webinar with Daniel Stenberg, the founder and lead developer of curl and libcurl, on August 15th at 10 am PT. Daniel will present “Getting Started with libcurl” for all skill levels. In this session, Daniel will delve into the core concepts and best practices of libcurl, the widely known […]
Read MoreMore TagCNSA 2.0 Update Part 5: PSK
On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of an FAQ. This is the fifth and final in a series of postings about the questions and answers that we feel are most interesting and our reactions to them. Q: […]
Read MoreMore TagCNSA 2.0 Update Part 4: Deployment
On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of an FAQ. This is the fourth in a multipart series of postings about the questions and answers that we feel are most interesting and our reactions to them. Q: When […]
Read MoreMore TagCNSA 2.0 Update Part 3: LMS and XMSS
On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of an FAQ. This is the third in a multipart series of postings about the questions and answers that we feel are most interesting and our reactions to them. But first, […]
Read MoreMore TagCNSA 2.0 Update Part 2: NIAP
On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of an FAQ. This is the second in a multipart series of postings about the questions and answers that we feel are most interesting and our reactions to them. But first, […]
Read MoreMore Tag
