We have added support for creating and verifying signatures with ML-DSA. This new feature was introduced in wolfCLU release 0.1.6 and can be seen in the handy help message by running `wolfssl -h`. There are a couple of options available to be passed to the new `dilithium` command to increase the flexibility for tuning performance […]
Read MoreMore TagMonth: November 2024
Post-Quantum Cryptography on an Automotive HSM??
Quantum computers are not a far-off dream anymore—they are increasingly becoming a reality, and that brings challenges for the future of secure communications. Traditional public-key cryptosystems like RSA and ECC are vulnerable to quantum attacks, making the transition to post-quantum cryptography (PQC) a vital consideration for businesses planning long-term security solutions, especially those in the […]
Read MoreMore TagKick Off the Holidays with wolfSSL’s Week of Webinars
Get ready to kick off the holiday season with wolfSSL’s Week of Webinars! From December 2nd to December 6th, join our cybersecurity experts as we dive into critical topics such as FIPS 140-3 compliance, DTLS 1.3, incorporating wolfSSH into your Yocto builds, and the launch of Rock-Solid curl. We’re bringing you in-depth knowledge to boost […]
Read MoreMore TagSM Ciphers on an HSM??
In recent years, China’s cryptographic standards have gained significant traction on the global stage, with algorithms like SM2, SM3, and SM4 setting the standard for secure communications within Chinese regulatory frameworks. Companies operating in or doing business with China must support these ciphers to meet compliance requirements and to ensure secure interoperability. However, until now, […]
Read MoreMore TagPKCS7 parsing in wolfCLU
Parsing and viewing PKCS7 bundles just got easier with the addition of the `pkcs7` command in wolfCLU. This neat command takes multiple arguments allowing for printing out the certificates contained in a PKCS7 bundle and parsing both PEM and DER formats. Creation of PKCS7 bundles is supported using wolfSSL API’s but not yet supported in […]
Read MoreMore TagEnhancing Realm Database Security with wolfSSL
Are you looking to add FIPS 140-3 certified cryptography to your Realm database? wolfSSL has you covered! We’ve successfully integrated wolfSSL into Realm, providing you with robust TLS and cryptographic functionality. A version tested on Linux is available, and we can also help you enable support for platforms like Android and iOS upon request. Getting […]
Read MoreMore TagWant to Comply with CNSA 2.0? Move to DTLS 1.3!
For anyone using DTLS 1.2, now might be a good time to start moving to DTLS 1.3. Why is now a good time? It is likely that you own both the server and the client so you have full control over the migration process. New post-quantum authentication (ML-DSA) and key exchange (ML-KEM) algorithms will soon […]
Read MoreMore TagLive Webinar: What’s new in wolfBoot
Learn how wolfBoot 2.3.0 revolutionizes secure boot for embedded systems with groundbreaking features designed for quantum resistance and hybrid authentication. Join us for our upcoming webinar, What’s new in wolfBoot, on November 21st at 10 AM PT, presented by wolfSSL Software Engineer Daniele Lacamera. Gain insights into the integration of ML-DSA signature algorithms, the impact […]
Read MoreMore TagwolfCLU Release 0.1.6
wolfCLU release 0.1.6 is available! wolfSSL’s command line utility (wolfCLU) is a drop in replacement for the OpenSSL command line utility. It’s a handy swiss army knife of common operations used, often great for system admins or test developers. Doing things such as creating and signing certificates, generating new keys, parsing X509 certificates into human […]
Read MoreMore TagJoin Our Live Webinar: Post-Quantum Algorithms in curl
Join us for an exclusive webinar on the cutting-edge integration of post-quantum algorithms in curl! As quantum computing advances, the need for quantum-safe cryptography is becoming critical. wolfSSL Senior Software Developer Anthony Hu will introduce essential concepts and demonstrate how to future-proof your applications against quantum threats using curl. Register Now: Post-Quantum Algorithms in curl […]
Read MoreMore Tag
