wolfSSL is adding support for X509 Attribute Certificates (ACERTs, for short), enabled with –enable-acert. This initial support includes reading, printing, and verifying. Furthermore, it uses our new ASN.1 template implementation, and supports RSA-PSS as well. But what is an X509 Attribute Certificate, and how does it differ from the more commonly encountered X509 Public Key […]
Read MoreMore TagMonth: October 2024
LMS in PKCS11
Most people know that wolfSSL supports being a PKCS11 consumer. It is easy to enable this with the –enable-pkcs11 configure time flag and then trying out the examples. Now, what most people don’t realize is that we also have the ability to be a PKCS11 provider!! This is via our library called wolfPKCS11. Check out […]
Read MoreMore TagRepurposing ESP32 Devices for Enhanced Security: Insights from wolfSSL at Hackaday 2024
We’re excited to announce that wolfSSL will be attending the 2024 Hackaday Superconference from November 1st to 3rd in sunny Pasadena, California, as a featured speaker! Don’t miss our insightful talk, “Repurposing ESP32 Based Commercial Products,” where you’ll learn how to secure ESP32 devices and turn them into HomeKit compatible tools by flashing custom software […]
Read MoreMore TagLive Webinar In the European Time Zone: Everything You Need to Know About FIPS 140-3
Curious about how FIPS 140-3 can elevate your security strategy? Join us on October 30th for an exclusive webinar with Kaleb Himes, Senior Software Engineer at wolfSSL. Kaleb will break down everything you need to know about the latest in cryptographic standards. From key differences between FIPS 140-2 and FIPS 140-3 to wolfCrypt’s industry-leading achievement, […]
Read MoreMore TagwolfSSL 5.7.4 Release
wolfSSL release 5.7.4 is now available, with exciting optimizations for ARM devices and enhancements to post-quantum cryptography algorithms. If you’re using wolfSSL on RISC-V, we’ve also included new performance enhancements specifically for RISC-V devices. Alongside these optimizations and new features, several important fixes were made. One notable fix involves the behavior of X509_STORE_add_cert() and X509_STORE_load_locations() […]
Read MoreMore TagwolfBoot: Secure Boot now with support for FIPS 204 ML-DSA post-quantum signature algorithm
NIST recently announced three new standards for post-quantum cryptography (FIPS 203-205), and among them was ML-DSA (FIPS 204, Module-Lattice Digital Signature Algorithm), a lattice-based algorithm derived from the round 3 finalist CRYSTALS-DILITHIUM. As a general purpose digital signature algorithm ML-DSA has attractive features, such as fast key generation, signing, and verifying, as well as a […]
Read MoreMore TagAchieving WireGuard GO FIPS Compliance with wolfCrypt
Last week we put out a blog post sharing our integration of wolfCrypt into WireGuard. But did you know that we’ve already ported our FIPS 140-3 certified cryptographic engine into WireGuard GO, the official user space implementation of WireGuard in golang? In cases where WireGuard’s functionality is desired, but a kernel isn’t available or installing […]
Read MoreMore TagWhat are FIPS 203, 204, and 205?
This year, NIST released the following official standards documents: FIPS 203 FIPS 204 FIPS 205 What are they and what do they standardize? As a quick summary: Kyber became ML-KEM (Module-Lattice-based Key-Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document. Dilithium became ML-DSA (Module-Lattice-based Digital Signature Algorithm) which is specified by NIST’s FIPS 204 […]
Read MoreMore TagJoin wolfSSL Live Webinar: Getting Started with wolfMQTT
Unlock the Full Potential of Your IoT Security! Join us for our upcoming webinar, “Getting Started with wolfMQTT,” on October 24th at 10 AM PT. This session will be led by wolfSSL Senior Software Engineer Eric Blankenhorn. He will introduce you to wolfMQTT, a lightweight client implementation of the MQTT protocol written in C for […]
Read MoreMore TagLive Webinar: FIPS 140-3 and CNSA 2.0 Compliance in a Single Connection
As cybersecurity standards continue to evolve, FIPS 140-3 is set to become the cornerstone of government security compliance, offering stronger assurances for cryptographic security. To help you stay ahead of these requirements and implement robust solutions, we’re excited to invite you to our upcoming webinar: FIPS 140-3 and CNSA 2.0 Compliance in a Single Connection. […]
Read MoreMore Tag
