Learn how to integrate wolfSSL with Visual Studio 2022 for secure development. Are you looking to level up your development skills and implement secure communication in your applications? Join our webinar, “Getting Started with wolfSSL Using Visual Studio 2022,” on February 19th at 10 AM PT. Discover how to seamlessly integrate wolfSSL’s powerful TLS library […]
Read MoreMore TagMonth: February 2025
wolfSSL Inc. SP800-140C and Post-Quantum efforts update!
This is an update to previous post Everything wolfSSL is Preparing for Post-Quantum as of Spring 2024 and an extension to post wolfSSL Support for Post-Quantum. The National Institute of Standards and Technology (NIST) has recently updated its guidelines, enabling the certification of several post-quantum cryptographic algorithms through the Cryptographic Module Validation Program (CMVP). Notably, […]
Read MoreMore TagSPAKE and wolfSSL in Kerberos 5
In today’s digital landscape, the need for robust authentication mechanisms has never been more crucial. Among the various methods available, SPAKE (Simple Password-Authenticated Key Exchange) stands out as an enhanced security solution for authenticating users. SPAKE represents a significant advancement over traditional password-based authentication, which often relies on static hashes. By leveraging a shared secret […]
Read MoreMore TagIPsec vs TLS: what are the differences
IPsec (Internet Protocol Security) and TLS (Transport Layer Security) are both used to protect data in transit between devices, and to secure network traffic over public or private internet. Both have cryptographic mechanisms for encryption, integrity checking, mutual authentication, replay protection, key exchange, etc. However, they operate at different network layers, and have different strengths […]
Read MoreMore TagWhen wolfSSL_UseKeyShare() is not Enough
Ladies and gentlemen, it’s story time!! Once upon a time, there was a network administrator that only wanted to use the strongest NIST-approved ECC encryption available within the TLS 1.3 protocol. They picked ECDHE over the secp521r1 curve. When they went to code their application, they wanted the best TLS library available so they naturally […]
Read MoreMore TagDeprecation Announcement: RC2
As part of our ongoing effort to maintain the highest level of security and performance, we are announcing the upcoming deprecation of RC2 from wolfCrypt. All of our products depend on wolfCrypt for their algorithm implementations so this could have consequences across our whole product line. What is RC2? RC2 is a symmetric-key block cipher […]
Read MoreMore TagUnlocking the Power of Secure Boot for AMD/Xilinx UltraScale+ MPSoC Systems
With the release of WolfBoot version v2.4.0, we have made significant improvements to our secure boot support for Xilinx UltraScale+ MPSoC systems. This major update brings several key enhancements that make it easier and more efficient to deploy wolfBoot on this target. UltraScale+ enhancements in wolfBoot v2.4.0 To see the complete list of improvements see […]
Read MoreMore TagThe Risks of 3DES in FIPS Certificates
When it comes to securing data, cryptographic algorithms are the backbone of many systems. 3DES (Triple Data Encryption Standard) was once a FIPS (Federal Information Processing Standards) algorithm but is no longer supported by NIST as of 1 Jan 2024 (over 1 year ago!) Having 3DES in a FIPS module today could spell trouble on […]
Read MoreMore TagDeprecation Notice: liboqs Integration
Soon wolfSSL will no longer utilize the liboqs library. This change is intended to simplify the maintenance of the wolfSSL codebase by reducing the line count. The wolfSSL library already provides its own implementations of post-quantum algorithms, including Kyber and Dilithium. To enable these algorithms, users can simply configure wolfSSL with the following options: –enable-kyber […]
Read MoreMore TagWhy Transition to DTLS 1.3 is Crucial for CNSA 2.0 Compliance and Cybersecurity
As we advance towards stronger cybersecurity measures, adhering to the latest security standards is crucial. Transitioning to DTLS 1.3 is becoming a necessity for anyone still using DTLS 1.2. Here are four compelling reasons why now is the perfect time to make the switch: Full Control over the Migration ProcessTypically, you control both the server […]
Read MoreMore Tag
