Recently, a lot of post-quantum activity has been happening here at WolfSSL. First, we’ve simplified and unified our naming conventions for the variants of the post-quantum algorithms. We now refer to each variant by the algorithm submitter’s claimed NIST level. For example, what used to be referred to as LIGHTSABER is now known as SABER_LEVEL1 […]
Read MoreMore TagAuthor: Kajal Sapkota
How Much Resource Does Your TLS Take?
Adding security to a connection comes at a cost. It takes a little time to perform the crypto operations and some memory gets used during the operations. Not all TLS implementations are equal … how much memory and how much time is lost depends on what TLS library is being used. Recently OpenSSL came out […]
Read MoreMore TagHybrid Post Quantum Groups in TLS 1.3
Recently, we announced our wolfSSL libOQS integration and we said we were planning to hybridize our KEMs with NIST-standardized ECDSA. The hybridization is completed. This is a brief summary of why this matters and what we did. It might come as a shock, but the sad truth is that we do not actually know that […]
Read MoreMore TagCURL 7.79.1 – PATCHED UP AND READY
This post has been cross posted from Daniel Stenberg’s blog – originally posted here. Within 24 hours of the previous release, 7.79.0, we got a bug-report filed that identified a pretty serious regression in the HTTP/2 code that we deemed required a fairly quick fix instead of waiting a full release cycle for it. So here’s 7.79.1 […]
Read MoreMore TagcURL 7.79.0 – Secure Local Cookies
This post has been cross posted from Daniel Stenberg’s blog – originally posted here. The curl factory has once again cranked out a new curl release. Release presentation Numbers the 202nd release 3 changes 56 days (total: 8,580) 128 bug-fixes (total: 7,270) 186 commits (total: 27,651) 0 new public libcurl function (total: 85) 0 new curl_easy_setopt() […]
Read MoreMore TagStatic Analysis from wolfSSL with GrammaTech’s CodeSonar
*Jointly posted with GrammaTech wolfSSL is a lightweight embedded SSL/TLS library and we pride ourselves for being the best-tested crypto and SSL/TLS stack available on the market. From API unit testing to fuzz testing to continuous integration, we do it all to ensure we’re secure for our customers. Now we’re adding an additional static analysis […]
Read MoreMore TagOpenSSL 3.0 Provider solution with FIPS
As you may know, wolfSSL has integrated our FIPS-certified crypto module (wolfCrypt) with OpenSSL as an OpenSSL engine, a product we call wolfEngine. You may also know that OpenSSL 3.0 has done away with the engines paradigm in favor of a new concept, called providers. wolfSSL has begun work on an OpenSSL 3.0 provider, allowing […]
Read MoreMore TagwolfSSL adds Silicon Labs Hardware acceleration support
wolfSSL is excited to announce support for using Silicon Labs Hardware acceleration. The EFR32 family of devices support multiple wireless interfaces with hardware cryptographic operations. wolfSSL can now offload cryptographic operations for dramatically increased performance on the Silicon Labs EFR32 family! Our new support includes hardware acceleration of the following algorithms: RNG AES-CBC AES-GCM AES-CCM […]
Read MoreMore TagRSA 3k or ECC 384 support in wolfBoot
Public key infrastructure or PKI is important term used to define everything that is used to “create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.” (https://en.wikipedia.org/wiki/Public_key_infrastructure) As RSA and ECC are one of the main algorithms used for PKI key generation, we are wondering if anyone is interested in RSA 3k or ECC 384 support […]
Read MoreMore TagSniffing traffic with TLS v1.3
The wolfSSL library includes a useful tool for sniffing TLS traffic. This can be used to capture and decrypt live or recorded PCAP traces when at least one of the keys is known. Typically a static RSA ciphersuite would be used, however with TLS v1.3 only Perfect Forward Secrecy (PFS) ciphers are allowed. For TLS […]
Read MoreMore Tag
