Repurposing ESP32 Devices for Enhanced Security: Insights from wolfSSL at Hackaday 2024

We’re excited to announce that wolfSSL will be attending the 2024 Hackaday Superconference from November 1st to 3rd in sunny Pasadena, California, as a featured speaker! Don’t miss our insightful talk, “Repurposing ESP32 Based Commercial Products,” where you’ll learn how to secure ESP32 devices and turn them into HomeKit compatible tools by flashing custom software […]

Read MoreMore Tag

Live Webinar in the European Time Zone: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications

In the rapidly evolving automotive industry, ensuring data integrity, confidentiality, and authenticity is paramount. Hardware Security Modules (HSMs) play a critical role in this process by providing robust protection for cryptographic keys and secure data processing. Register today: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications in the European Time Zone Date: October […]

Read MoreMore Tag

wolfSSL wolfCrypt CSharp wrapper

wolfSSL is excited to announce additional support for wolfCrypt API’s in our CSharp (C#) wrapper. Our CSharp wrapper now includes wolfCrypt support for ECC (ECDSA/ECDHE), ECIES, RSA, ED25519/Curve25519, AES-GCM, and HASH cryptographic algorithms. The supported HASH algorithms are MD2, MD4, MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512, SHA-MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2B, and BLAKE2S. In […]

Read MoreMore Tag

Enhance Embedded System Security with ADI MAXQ1065 and wolfSSL

wolfSSL’s trusted partner, Analog Devices, Inc. (ADI), recently announced that integrating the MAXQ1065 with wolfSSL can significantly enhance security for IoT and embedded systems. Explore the ADI Engineer Zone blog post, Securing IoT and Embedded Systems: Integrate MAXQ1065 with wolfSSL, to discover wolfSSL’s competitive advantages and how this integration improves IoT security solutions and embedded […]

Read MoreMore Tag

Live Webinar: Automotive Hardware Security Modules: Functionality, Design, and Applications

In the fast-evolving automotive industry, securing data integrity, confidentiality, and authenticity is crucial. Hardware Security Modules (HSMs) are essential tools, offering robust protection for cryptographic keys and processing. Register Today: Automotive Hardware Security Modules: Functionality, Design, and Application Date: October 7th | 8 AM PT We invite you to an upcoming webinar, where Bill will […]

Read MoreMore Tag

FIPS-Certified WireGuard: Bringing wolfCrypt into the VPN Solution

As WireGuard continues to grow in popularity for its simplicity and efficiency in VPN deployments, security-conscious organizations are increasingly demanding solutions that adhere to stringent security standards, such as the Federal Information Processing Standard (FIPS 140-3). FIPS certification is a key requirement for governmental agencies and industries like healthcare and finance, where secure cryptographic implementations […]

Read MoreMore Tag

Support for the Official Post-Quantum Standards ML-KEM and ML-DSA

Just a little while back to much fanfare, NIST-release these standards: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf They are the post-quantum algorithms that are now standardized for use!! As a quick summary: Kyber became ML-KEM (Module Lattice Key Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document. Dilithium became ML-DSA (Module Lattice Digital Signature Algorithm) which is […]

Read MoreMore Tag

Posts navigation

1 2