Version 5.8.4 improves wolfSSL’s implementation of ML-KEM (formerly Kyber) and ML-DSA (formerly Dilithium) post-quantum algorithms. Download wolfSSL → Bug Fixes The ML-KEM derive secret operation was corrected to properly compute shared secrets; there was a miscalculation of an offset in a buffer. An out-of-bounds read was fixed in the ML-KEM/Kyber 5-bit value decomposition code, where […]
Read MoreMore TagCategory: Post-Quantum
ML-DSA OpenSSL Interoperability
The latest enhancement to wolfSSL’s ML-DSA (Module-Lattice-Based Digital Signature Algorithm) implementation solidifies interoperability with OpenSSL-generated cryptographic keys. This update introduces support for importing ML-DSA private keys that have been encoded using OpenSSL’s DER format. The new functionality extends the ASN.1 parsing logic to recognize and correctly decode an ASN.1 encoding structure that OpenSSL uses for […]
Read MoreMore TagCrypto-Agility in the LMS Private Key
Here at wolfSSL, we have enhanced our Leighton-Micali Signature (LMS) implementation with a new optional state serialization feature that significantly improves key reload performance for applications requiring frequent signing operations. The LMS post-quantum signature scheme is stateful by nature, meaning each signature operation updates the internal state of the private key, and this state must […]
Read MoreMore TagML-KEM hybrid TLS 1.3 Codepoint Backwards Compatibility
Here at wolfSSL, we have merged an important pull request addressing backward compatibility for post-quantum cryptography in TLS 1.3. This enhancement focuses on ML-KEM (Module-Lattice-Based Key Encapsulation Mechanism) codepoints, ensuring seamless interoperability between wolfSSL versions across the 5.8.0 release boundary. Prior to version 5.8.0, wolfSSL used specific codepoint identifiers for hybrid key exchange algorithms combining […]
Read MoreMore TagComing Soon: wolfSSL Takes PQC Toward FIPS Certification
wolfSSL is taking proactive steps to get our PQC implementations for FIPS 203 (ML-KEM), FIPS 204 (ML-DSA) LMS (verify-only) and XMSS (verify-only) validated through NIST. These standards define quantum-resistant key exchange and digital signature algorithms that meet the CNSA 2.0 transition requirements for government and regulated industries. FIPS certification is the gold standard for cryptographic […]
Read MoreMore TagSLIM: Securing AI Agent Communication with MLS
As artificial intelligence continues to evolve and transform industries, here at wolfSSL we are closely monitoring developments in Agent to Agent communication protocols such as A2A and SLIM. We recently wrote our blog post “A2A and wolfSSL” talking about how it is secured via TLS. One particularly interesting development in this space is SLIM (Secure […]
Read MoreMore TagLMS Versus XMSS Versus SLH-DSA
Here at wolfSSL, we don’t just love coding! We love telling the world about what we code. To that end, we want you to understand the differences between LMS, XMSS, and SLH-DSA. Here are their official standard specifications: LMS (Leighton-Micali Hash-Based Signatures) XMSS (eXtended Merkle Signature Scheme) SLH-DSA (Stateless Hash-Based Digital Signature Standard) The most […]
Read MoreMore TagUpdated Post-Quantum Benchmarks for ML-KEM and ML-DSA on STM32
A long, long time ago, we took some benchmarks for Kyber on STM32 NUCLEO-F446ZE. Back then, it was the NIST Submission of Kyber, and we were using the implementation from PQM4 as integration in wolfCrypt. Now, Kyber has evolved into ML-KEM, and we have our implementation! We decided to take some benchmarks on a newer […]
Read MoreMore TagOptimizing Post-Quantum Algorithm Memory Usage on Embedded Systems
Here at wolfSSL, we are intimately aware of the needs of our embedded customers. It is always about the tradeoffs and optimizations that fit their unique use cases and needs. The tradeoffs are typically between speed, footprint size, and memory usage. In many of our blog posts, we like to focus on our speed performance, […]
Read MoreMore TagML-KEM Versus HQC KEM
ML-KEM (Module-Lattice Key Encapsulation Mechanism) and HQC (Hamming Quasi-Cyclic) are both post-quantum cryptographic key encapsulation mechanisms (KEMs) designed to provide secure key exchange in the presence of CRQCs (Cryptographically Relevant Quantum Computers). ML-KEM is based on the (M-LWE) Module Learning With Errors problem, which involves finding a short vector between two points in a high […]
Read MoreMore Tag
