With the CNSA (Commercial National Security Algorithm) 2.0 Suite coming into sharp focus recently, we thought we would talk about the history of how we got here and then focus on the differences between the various suites that came before it. The first time the NSA came out with a suite of algorithms to be […]
Read MoreMore TagMonth: October 2024
Repurposing ESP32 Devices for Enhanced Security: Insights from wolfSSL at Hackaday 2024
We’re excited to announce that wolfSSL will be attending the 2024 Hackaday Superconference from November 1st to 3rd in sunny Pasadena, California, as a featured speaker! Don’t miss our insightful talk, “Repurposing ESP32 Based Commercial Products,” where you’ll learn how to secure ESP32 devices and turn them into HomeKit compatible tools by flashing custom software […]
Read MoreMore TagLive Webinar in the European Time Zone: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications
In the rapidly evolving automotive industry, ensuring data integrity, confidentiality, and authenticity is paramount. Hardware Security Modules (HSMs) play a critical role in this process by providing robust protection for cryptographic keys and secure data processing. Register today: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications in the European Time Zone Date: October […]
Read MoreMore TagwolfSSL wolfCrypt CSharp wrapper
wolfSSL is excited to announce additional support for wolfCrypt API’s in our CSharp (C#) wrapper. Our CSharp wrapper now includes wolfCrypt support for ECC (ECDSA/ECDHE), ECIES, RSA, ED25519/Curve25519, AES-GCM, and HASH cryptographic algorithms. The supported HASH algorithms are MD2, MD4, MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512, SHA-MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2B, and BLAKE2S. In […]
Read MoreMore TagEnhance Embedded System Security with ADI MAXQ1065 and wolfSSL
wolfSSL’s trusted partner, Analog Devices, Inc. (ADI), recently announced that integrating the MAXQ1065 with wolfSSL can significantly enhance security for IoT and embedded systems. Explore the ADI Engineer Zone blog post, Securing IoT and Embedded Systems: Integrate MAXQ1065 with wolfSSL, to discover wolfSSL’s competitive advantages and how this integration improves IoT security solutions and embedded […]
Read MoreMore TagLive Webinar: Automotive Hardware Security Modules: Functionality, Design, and Applications
In the fast-evolving automotive industry, securing data integrity, confidentiality, and authenticity is crucial. Hardware Security Modules (HSMs) are essential tools, offering robust protection for cryptographic keys and processing. Register Today: Automotive Hardware Security Modules: Functionality, Design, and Application Date: October 7th | 8 AM PT We invite you to an upcoming webinar, where Bill will […]
Read MoreMore TagFIPS-Certified WireGuard: Bringing wolfCrypt into the VPN Solution
As WireGuard continues to grow in popularity for its simplicity and efficiency in VPN deployments, security-conscious organizations are increasingly demanding solutions that adhere to stringent security standards, such as the Federal Information Processing Standard (FIPS 140-3). FIPS certification is a key requirement for governmental agencies and industries like healthcare and finance, where secure cryptographic implementations […]
Read MoreMore TagSupport for the Official Post-Quantum Standards ML-KEM and ML-DSA
Just a little while back to much fanfare, NIST-release these standards: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf They are the post-quantum algorithms that are now standardized for use!! As a quick summary: Kyber became ML-KEM (Module Lattice Key Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document. Dilithium became ML-DSA (Module Lattice Digital Signature Algorithm) which is […]
Read MoreMore Tag
