TLS session resumption reuses previously negotiated keying material to shorten handshakes and reduce CPU and network overhead. Resumption saves latency and power on constrained devices by avoiding a full handshake when a safe cached session is available.—–Understanding Session IDs and Tickets Session IDs are a server-issued identifier used by TLS ≤ 1.2 where the server […]
Read MoreMore TagMonth: May 2026
How to Leverage FIPS to Meet Common Criteria Requirements
Does your project require meeting Common Criteria standards? Using wolfSSL’s FIPS-validated module (or FIPS-ready which is tailored towards FIPS requirements) helps a lot with meeting CC (Common Criteria) because it gives strong, reusable evidence for the crypto portion through independent validation of crypto algorithms and validation evidence with ACVP workflows. Having the ACVP tests and […]
Read MoreMore TagStopping Ransomware at the Device Level
Ransomware now targets medical devices, not just IT systems. Once malicious code runs on a device, it can disrupt patient care. The best defense is preventing execution. wolfSSL blocks ransomware before it runs: wolfBoot – Prevents unauthorized firmware from executing at startup wolfCrypt – Encrypts storage and secures firmware updates to prevent tampering wolfSentry – […]
Read MoreMore TagFIPS 140-3 Encryption for Connected Medical Devices
Medical devices need encryption, but government and healthcare buyers often require FIPS 140-3 validated cryptography to meet compliance standards. wolfCrypt FIPS 140-3 provides validated encryption for embedded medical devices with lower memory and processing requirements than standard crypto libraries. It protects stored data and data in transit. wolfSSL FIPS extends this validation to TLS connections […]
Read MoreMore TagWhy Secure Boot Is Now an FDA Expectation
The FDA now expects medical devices to use a secure boot. Without it, devices can run unauthorized firmware, including malware or compromised code from supply chain attacks. wolfBoot is a secure bootloader for embedded medical devices. It uses wolfCrypt to verify firmware signatures before allowing code to run. Only authenticated firmware executes. For additional security: […]
Read MoreMore TagSecuring Medical Devices From Device to Cloud
Medical devices send patient data from bedside monitors and wearables to cloud systems. That data needs protection at every step. wolfSSL secures the full path: wolfSSL/wolfCrypt – Encrypted communication ((D)TLS 1.3) between devices and servers wolfMQTT – Secure messaging for device-to-cloud data transfer wolfSSH – Encrypted remote access for maintenance and diagnostics wolfTPM – Hardware […]
Read MoreMore TagFIPS 140-3 Validated OpenZFS Encryption: Is There Demand?
We’re looking at building a wolfCrypt backend for OpenZFS native encryption. Before we commit, we want to know who needs it. If you’re running encrypted ZFS datasets, you’re running unvalidated crypto that no FIPS module can currently help with. Nobody offers FIPS-validated ZFS encryption. Anywhere. The engineering is straightforward. We have already spec’d and prototyped […]
Read MoreMore TagNo Medical Safety Without Security
Connected medical devices create new risks. A compromised device can expose patient data, fail during treatment, or be manipulated to cause harm. wolfSSL provides security tools built for medical device constraints: wolfCrypt – Lightweight encryption to protect data and device functions wolfEntropy – NIST-compliant random number generation for strong cryptographic keys wolfSentry – Firewall that […]
Read MoreMore TagTerminology Tuesday: Key Establishment and Friends
Key Establishment: This is the broader umbrella term that encompasses any protocol by which parties establish a shared secret key. It includes both key agreement and key transport as subcategories. Key establishment is the general goal, while key agreement and key transport are the two main approaches to achieving it. Key Agreement: A protocol where […]
Read MoreMore TagKeystores and Secure Elements supported by wolfSSL In 2026
When looking to store your cryptographic secrets, it is important to have a good platform to store them on. Even more important is the ease of accessing and using those secrets. With wolfTPM, we have support for all TPM 2.0 APIs. Additionally, we provide the following wrappers: Key Generation/Loading RSA encrypt/decrypt ECC sign/verify ECDH NV […]
Read MoreMore Tag
