RECENT BLOG NEWS
Live Webinar in the European Time Zone: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications
In the rapidly evolving automotive industry, ensuring data integrity, confidentiality, and authenticity is paramount. Hardware Security Modules (HSMs) play a critical role in this process by providing robust protection for cryptographic keys and secure data processing.
Register today: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications in the European Time Zone
Date: October 16th | 6 AM PT / 3 PM CEST (Central European Summer Time)
This webinar is specifically designed for attendees in the European time zone.
Join us for an insightful webinar where Bill will explore the vital role of automotive HSMs. This session will cover a variety of key topics (agenda subject to change), including:
- Essentials of Hardware Security Modules: Learn about the fundamental principles and functionalities of HSMs and their importance in automotive cybersecurity.
- Functional Design Insights: Discover the design and operational features of advanced HSMs that enhance vehicle security.
- Applications in AUTOSAR, SHE, and PKCS11: Understand how HSMs are integrated into critical automotive standards and frameworks, ensuring compliance and security.
- Hardware Porting and Support Strategies: Gain effective strategies for porting and supporting HSMs across various hardware environments.
- Demonstration of Practical Applications: A demonstration on a popular microcontroller, showcasing practical applications of HSM technology in securing automotive systems.
Don’t miss this opportunity to deepen your understanding of automotive HSMs and their essential role in securing next-generation vehicles. Register now to secure your spot!
As always, our webinars will include Q&A sessions throughout. If you have questions on any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
wolfSSL wolfCrypt CSharp wrapper
wolfSSL is excited to announce additional support for wolfCrypt API’s in our CSharp (C#) wrapper. Our CSharp wrapper now includes wolfCrypt support for ECC (ECDSA/ECDHE), ECIES, RSA, ED25519/Curve25519, AES-GCM, and HASH cryptographic algorithms. The supported HASH algorithms are MD2, MD4, MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512, SHA-MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2B, and BLAKE2S.
In addition to the CSharp wrapper, we supply a comprehensive test suite, `wolfCrypt-Test.cs` to test all of the supported cryptographic algorithms. The PR for these changes can be found here: PR# 3166.
To start using the wolfCrypt CSharp wrapper, please refer to the README.md, which contains useful information on how to get started. Another useful resource is the `wolfCrypt-Test.cs` suite, which shows common use cases and can help in validating your application setup.
If you have any questions about our wolfCrypt CSharp wrapper or need assistance, feel free to email us at facts@wolfssl.com or call us at +1 425 245 8247.
Download wolfSSL Now
Enhance Embedded System Security with ADI MAXQ1065 and wolfSSL
wolfSSL’s trusted partner, Analog Devices, Inc. (ADI), recently announced that integrating the MAXQ1065 with wolfSSL can significantly enhance security for IoT and embedded systems. Explore the ADI Engineer Zone blog post, Securing IoT and Embedded Systems: Integrate MAXQ1065 with wolfSSL, to discover wolfSSL’s competitive advantages and how this integration improves IoT security solutions and embedded system security applications.
If you have questions about any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
Live Webinar: Automotive Hardware Security Modules: Functionality, Design, and Applications
In the fast-evolving automotive industry, securing data integrity, confidentiality, and authenticity is crucial. Hardware Security Modules (HSMs) are essential tools, offering robust protection for cryptographic keys and processing.
Register Today: Automotive Hardware Security Modules: Functionality, Design, and Application
Date: October 7th | 8 AM PT
We invite you to an upcoming webinar, where Bill will delve into automotive HSMs. This session will cover a range of topics including:
- Essentials of Hardware Security Modules: Understand the core principles and functionalities of HSMs.
- Functional Design Insights: Gain insights into the design and operational aspects of advanced HSMs.
- Applications in AUTOSAR, SHE, and PKCS11: Discover how HSMs are integrated into these key automotive standards and frameworks.
- Hardware Porting and Support Strategies: Learn about effective strategies for porting and supporting HSMs in various hardware environments.
This webinar will also feature a demonstration on a popular microcontroller, showcasing practical applications of HSM technology.
Don’t miss this chance to enhance your understanding of automotive HSMs and their role in securing next-generation vehicles. Register now!
As always, our webinars will include Q&A sessions throughout. If you have questions on any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
FIPS-Certified WireGuard: Bringing wolfCrypt into the VPN Solution
As WireGuard continues to grow in popularity for its simplicity and efficiency in VPN deployments, security-conscious organizations are increasingly demanding solutions that adhere to stringent security standards, such as the Federal Information Processing Standard (FIPS 140-3). FIPS certification is a key requirement for governmental agencies and industries like healthcare and finance, where secure cryptographic implementations are mandatory. However, WireGuard’s default cryptographic implementations, while highly secure, are not FIPS-certified.
This is where wolfCrypt steps in. wolfCrypt is a lightweight, portable, and highly optimized cryptographic library that offers FIPS 140-3 certification, making it an ideal partner for users seeking FIPS compliance in their WireGuard deployments. With our planned integration, we’ll replace the standard crypto suite that WireGuard offers (ChachaPoly, Curve25519, Blake2s) with our own certified algorithms (AES GCM, ECC P-256, SHA-256). One thing to note here is that FIPS-ified WireGuard end-points may only communicate with other FIPS-ified end-points. But this of course is not a bug, but a feature. FIPS can only talk to FIPS.
So by leveraging our incoming integration, users can gain access to a VPN solution that is both secure and FIPS-compliant. This is especially important for industries with strict security requirements. The performance of WireGuard, combined with the certified cryptographic operations of wolfCrypt, ensures that you don’t sacrifice speed or security. In fact, with wolfCrypt’s ability to utilize hardware acceleration for AES and SHA, you might end up with a much faster WireGuard. Additionally, wolfCrypt’s small footprint makes it a practical choice for deployments in constrained environments, including IoT devices, embedded systems, and edge computing setups. You get a robust, certified security layer without bogging down performance.
Are you interested in WireGuard with wolfCrypt?
If you have questions about any of the above or need assistance, please contact us at facts@wolfSSL.com or call us at +1 425 245 8247.
Download wolfSSL Now
Support for the Official Post-Quantum Standards ML-KEM and ML-DSA
Just a little while back to much fanfare, NIST-release these standards:
- https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf
- https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf
- https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf
They are the post-quantum algorithms that are now standardized for use!! As a quick summary:
- Kyber became ML-KEM (Module Lattice Key Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document.
- Dilithium became ML-DSA (Module Lattice Digital Signature Algorithm) which is specified by NIST’s FIPS 204 document.
- SPHINCS+ became SLH-DSA (StateLess Hash-based Digital Signature Algorithm) which is specified by NIST’s FIPS 205 document.
ML-KEM and ML-DSA are great for general purpose use in protocols. For example, where you would use ECDH you would use ML-KEM and where you would use ECDSA you would use ML-DSA. SLH-DSA has specialized applications similar to those of LMS and XMSS. If you don’t want to deal with the statefulness of those algorithms, then SLH-DSA would be a great replacement.
Hot on the heels of this standardization announcement, we here at wolfSSL are announcing to the world that we have full implementation and support for ML-KEM and ML-DSA. You can have a look and try them out for yourself. Simply download the wolfSSL library, configure it to enable Dilithium and Kyber and run the benchmarks!
If you are interested in an implementation and support for SLH-DSA or have questions about any of the avobe, please contact us at facts@wolfSSL.com or +1 425 245 8247!
Download wolfSSL Now
Live Webinar: Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx
Explore how wolfSSL enhances security on Xilinx Devices in an upcoming webinar.
Join wolfSSL software Developer Jacob Barthelmeh in our live webinar, Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx, on October 2nd at 10am PT. Dive into the world of secure embedded systems and discover how to optimize wolfSSL for Xilinx platforms, including Versal, MPSoC UltraScale, and MicroBlaze.
Register today: Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx
Date: October 2nd | 10am PT
Jacob will guide you through building wolfSSL for Xilinx devices, highlighting the integration of wolfCrypt’s FIPS 140-3 mode, hardware acceleration ports with XilSecure, and using ARM assembly optimizations for performance improvements.
You’ll also explore how to incorporate wolfSSL into PetaLinux environments for maximum security, utilize wolfBoot on Xilinx/AMD devices, and understand how wolfSSL ports to various environments. Additionally, Jacob will showcase the use of wolfHSM with Xilinx/AMD platforms, offering valuable insights into implementing robust cryptographic security for your Xilinx devices.
This webinar will cover (agenda subject to change):
- Building wolfSSL for Xilinx devices (Versal, MPSoC UltraScale, MicroBlaze)
- Leveraging FIPS 140-3 mode for security compliance
- Integrating hardware acceleration, including XilSecure
- ARM assembly optimizations for performance
- Using wolfSSL with PetaLinux
- wolfBoot on Xilinx/AMD devices
- Porting wolfSSL to other environments
- Using wolfHSM with Xilinx/AMD
Don’t miss this opportunity to learn how wolfSSL can enhance security on your Xilinx systems. Register today to secure your spot and deepen your understanding of embedded security with wolfSSL on Xilinx platforms!
As always, our webinars will include Q&A sessions throughout. If you have questions on any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
Post-Quantum wolfHSM on Aurix Tricore
The title says it all!! If you have been paying any attention at all to us here at wolfSSL, you will know that we are very proud of our wolfHSM product that already runs on the Aurix Tricore. What we have not been focusing on is the post-quantum algorithms that work with wolfHSM. Let’s use this blog post to fix that oversight.
In this post we will be focusing on ML-KEM, ML-DSA, and especially LMS and XMSS as they are all implemented in wolfCrypt and are therefore available in wolfHSM to protect you from the oncoming quantum threat.
First of all, ML-KEM is a Key Encapsulation Mechanism and generally used for key establishment. In most protocols this means it is used ephemerally, but because of the security properties inherent in the algorithm, it can also be used statically. That means it is fine for wolfHSM to generate an ML-KEM private key and use it multiple times under the protection of the HSM core.
Naturally, as MLDSA is a general purpose post-quantum signature scheme, wolfHSM has an opportunity to help just like in the case of ECDSA or RSA.
Now, where wolfHSM provides a unique offering is LMS and XMSS. These are stateful hash-based signature schemes which are great for firmware and software signing. That said, there is a state associated with the private key and that state MUST be properly managed. A consequence of improper management is that the key pair must be revoked and all signatures encountered after the point of revocation cannot be trusted.
Software libraries that implement signing by stateful hash-based signature schemes, such as wolfSSL, must trust the application developer to properly manage the state. In the case of wolfHSM, the wolfSSL team’s expertise can come into play to ensure proper management of the state. The application developer no longer needs to be an expert in post-quantum algorithms; simply a user of them.
If you’d like to learn how wolfHSM can support your post-quantum migration or have any questions, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
wolfSSH with X.509 Certificates
Did you know wolfSSH can use X.509 certificates in place of SSH public keys? wolfSSH supports RFC 6187, “X.509v3 Certificates for Secure Shell Authentication”. This uses wolfSSL’s certificate management for TLS, so the certificates may be checked against CRLs and OCSP.
wolfSSH has been used in applications as a server where it needed to validate some FPKI (Federal Public Key Infrastructure) profiles. It is used with clients that authenticate the user’s credentials accessed via a card reader. wolfSSH’s client can be given an X.509 certificate to authenticate the user with the server.
If you have questions about wolfSSH, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
FIPS vs FedRAMP Compliance and Requirements
The wolfSSL team has noticed an uptick in questions about FedRAMP requirements. Today, we want to cover the differences between FIPS and FedRAMP.
FIPS:
The Federal Information Processing Standards (FIPS) stipulate security requirements for cryptographic modules, which wolfSSL Inc. meets with our wolfCrypt FIPS module. NIST and the CMVP then encourage all federal programs using cryptography to follow these standards. Federal Procurement Officers (at the urging of NIST and the CMVP) then require FIPS compliance for solutions that consume cryptography and are used within the scope of their federal program(s).
FEDRAMP:
The Federal Risk and Authorization Management Program (FedRAMP) focuses on the security assessment, authorization, and continuous monitoring of cloud products and services. A prerequisite for FedRAMP is the proper implementation of a FIPS-validated cryptographic module by the cloud service provider.
Both programs aim to enhance data security but differ in scope. While FIPS focuses on cryptographic module validation and cryptography, FedRAMP ensures the overall security of cloud services, one part of which is proper implementation of FIPS validated cryptography for all cryptography running in the cloud. Beyond checking for proper FIPS implementations, FedRAMP also ensures the cloud service provider is fully compliant with NIST SP 800-53 IE: Security Controls, a NIST Risk Management Framework (RMF), service is monitored continuously, data protection methods are robust, incidents can be detected, responded to and recovered from, and more. For a complete list please refer to SP 800-53 at this [LINK].
To support wolfSSL customers, wolfSSL Inc. offers a service to fully validate any Operational Environment (OE) (IoT, embedded, FPGA, Digital Signal Processor (DSP), laptop, desktop, server blade, or cloud system). wolfSSL Inc (the vendor) will fully test and validate the OE of choice using a third-party NVLAP accredited FIPS lab (or CSTL) and get the OE listed as a CMVP-validated OE on the wolfCrypt FIPS Certificate. This is a CMVP-backed OE addition which is guaranteed to be acceptable by any federal program with a FIPS requirement, as opposed to vendor affirmation or user affirmation which often fall short of the mark. Additionally, once the primary certificate is updated with the OE of choice, a rebranded cert with the customer’s logo and letterhead can be offered including that new OE.
wolfSSL’s wolfCrypt FIPS module supports the latest FIPS 140-3 standards and holds the world’s first SP800-140Br1 FIPS 140-3 validated certificate (#4718). Our expert support team is available to assist with the proper implementation of the module on your target OE, a critical step for achieving a successful FedRAMP effort.
Beyond getting proper OE’s for FEDRAMP initiatives, wolfSSL can support customers that are either:
- Using an alternative OS within AWS, Azure, or Oracle cloud, or,
- If you are standing up your own cloud, support you with meeting the FedRAMP FIPS requirements for the operating system of your choice.
For more information on how wolfSSL can help with your FIPS or FedRAMP compliance needs, shoot us an email at fips@wolfSSL.com today!
If you have questions about any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247.
Download wolfSSL Now
Weekly updates
Archives
- January 2025 (18)
- December 2024 (22)
- November 2024 (29)
- October 2024 (18)
- September 2024 (21)
- August 2024 (24)
- July 2024 (27)
- June 2024 (22)
- May 2024 (28)
- April 2024 (29)
- March 2024 (21)
- February 2024 (18)
- January 2024 (21)
- December 2023 (20)
- November 2023 (20)
- October 2023 (23)
- September 2023 (17)
- August 2023 (25)
- July 2023 (39)
- June 2023 (13)
- May 2023 (11)
- April 2023 (6)
- March 2023 (23)
- February 2023 (7)
- January 2023 (7)
- December 2022 (15)
- November 2022 (11)
- October 2022 (8)
- September 2022 (7)
- August 2022 (12)
- July 2022 (7)
- June 2022 (14)
- May 2022 (10)
- April 2022 (11)
- March 2022 (12)
- February 2022 (22)
- January 2022 (12)
- December 2021 (13)
- November 2021 (27)
- October 2021 (11)
- September 2021 (14)
- August 2021 (10)
- July 2021 (16)
- June 2021 (13)
- May 2021 (9)
- April 2021 (13)
- March 2021 (24)
- February 2021 (22)
- January 2021 (18)
- December 2020 (19)
- November 2020 (11)
- October 2020 (3)
- September 2020 (20)
- August 2020 (11)
- July 2020 (7)
- June 2020 (14)
- May 2020 (13)
- April 2020 (14)
- March 2020 (4)
- February 2020 (21)
- January 2020 (18)
- December 2019 (7)
- November 2019 (16)
- October 2019 (14)
- September 2019 (18)
- August 2019 (16)
- July 2019 (8)
- June 2019 (9)
- May 2019 (28)
- April 2019 (27)
- March 2019 (15)
- February 2019 (10)
- January 2019 (16)
- December 2018 (24)
- November 2018 (9)
- October 2018 (15)
- September 2018 (15)
- August 2018 (5)
- July 2018 (15)
- June 2018 (29)
- May 2018 (12)
- April 2018 (6)
- March 2018 (18)
- February 2018 (6)
- January 2018 (11)
- December 2017 (5)
- November 2017 (12)
- October 2017 (5)
- September 2017 (7)
- August 2017 (6)
- July 2017 (11)
- June 2017 (7)
- May 2017 (9)
- April 2017 (5)
- March 2017 (6)
- January 2017 (8)
- December 2016 (2)
- November 2016 (1)
- October 2016 (15)
- September 2016 (6)
- August 2016 (5)
- July 2016 (4)
- June 2016 (9)
- May 2016 (4)
- April 2016 (4)
- March 2016 (4)
- February 2016 (9)
- January 2016 (6)
- December 2015 (4)
- November 2015 (6)
- October 2015 (5)
- September 2015 (5)
- August 2015 (8)
- July 2015 (7)
- June 2015 (9)
- May 2015 (1)
- April 2015 (4)
- March 2015 (12)
- January 2015 (4)
- December 2014 (6)
- November 2014 (3)
- October 2014 (1)
- September 2014 (11)
- August 2014 (5)
- July 2014 (9)
- June 2014 (10)
- May 2014 (5)
- April 2014 (9)
- February 2014 (3)
- January 2014 (5)
- December 2013 (7)
- November 2013 (4)
- October 2013 (7)
- September 2013 (3)
- August 2013 (9)
- July 2013 (7)
- June 2013 (4)
- May 2013 (7)
- April 2013 (4)
- March 2013 (2)
- February 2013 (3)
- January 2013 (8)
- December 2012 (12)
- November 2012 (5)
- October 2012 (7)
- September 2012 (3)
- August 2012 (6)
- July 2012 (4)
- June 2012 (3)
- May 2012 (4)
- April 2012 (6)
- March 2012 (2)
- February 2012 (5)
- January 2012 (7)
- December 2011 (5)
- November 2011 (7)
- October 2011 (5)
- September 2011 (6)
- August 2011 (5)
- July 2011 (2)
- June 2011 (7)
- May 2011 (11)
- April 2011 (4)
- March 2011 (12)
- February 2011 (7)
- January 2011 (11)
- December 2010 (17)
- November 2010 (12)
- October 2010 (11)
- September 2010 (9)
- August 2010 (20)
- July 2010 (12)
- June 2010 (7)
- May 2010 (1)
- January 2010 (2)
- November 2009 (2)
- October 2009 (1)
- September 2009 (1)
- May 2009 (1)
- February 2009 (1)
- January 2009 (1)
- December 2008 (1)