wolfSSL is taking proactive steps to get our PQC implementations for FIPS 203 (ML-KEM), FIPS 204 (ML-DSA) LMS (verify-only) and XMSS (verify-only) validated through NIST. These standards define quantum-resistant key exchange and digital signature algorithms that meet the CNSA 2.0 transition requirements for government and regulated industries. FIPS certification is the gold standard for cryptographic […]
Read MoreMore TagCategory: Post-Quantum
SLIM: Securing AI Agent Communication with MLS
As artificial intelligence continues to evolve and transform industries, here at wolfSSL we are closely monitoring developments in Agent to Agent communication protocols such as A2A and SLIM. We recently wrote our blog post “A2A and wolfSSL” talking about how it is secured via TLS. One particularly interesting development in this space is SLIM (Secure […]
Read MoreMore TagLMS Versus XMSS Versus SLH-DSA
Here at wolfSSL, we don’t just love coding! We love telling the world about what we code. To that end, we want you to understand the differences between LMS, XMSS, and SLH-DSA. Here are their official standard specifications: LMS (Leighton-Micali Hash-Based Signatures) XMSS (eXtended Merkle Signature Scheme) SLH-DSA (Stateless Hash-Based Digital Signature Standard) The most […]
Read MoreMore TagUpdated Post-Quantum Benchmarks for ML-KEM and ML-DSA on STM32
A long, long time ago, we took some benchmarks for Kyber on STM32 NUCLEO-F446ZE. Back then, it was the NIST Submission of Kyber, and we were using the implementation from PQM4 as integration in wolfCrypt. Now, Kyber has evolved into ML-KEM, and we have our implementation! We decided to take some benchmarks on a newer […]
Read MoreMore TagOptimizing Post-Quantum Algorithm Memory Usage on Embedded Systems
Here at wolfSSL, we are intimately aware of the needs of our embedded customers. It is always about the tradeoffs and optimizations that fit their unique use cases and needs. The tradeoffs are typically between speed, footprint size, and memory usage. In many of our blog posts, we like to focus on our speed performance, […]
Read MoreMore TagML-KEM Versus HQC KEM
ML-KEM (Module-Lattice Key Encapsulation Mechanism) and HQC (Hamming Quasi-Cyclic) are both post-quantum cryptographic key encapsulation mechanisms (KEMs) designed to provide secure key exchange in the presence of CRQCs (Cryptographically Relevant Quantum Computers). ML-KEM is based on the (M-LWE) Module Learning With Errors problem, which involves finding a short vector between two points in a high […]
Read MoreMore TagComing soon: HQC KEM
Hello there! You! We know you are out there. You learned about Hamming codes in college or university, and maybe even use them in your professional career in consumer electronics or telecommunications. Now you are wondering how simple error correcting codes can be transformed into a KEM (Key Encapsulation Mechanism) for doing secure key transport. […]
Read MoreMore TagML-KEM Versus ML-DSA
ML-KEM (Module Lattice Key Encapsulation Mechanism) is for secure key exchange. ML-KEM enables two parties to establish a shared secret key over an insecure channel. ML-DSA (Module Lattice Digital Signature Algorithm) is for authentication. ML-DSA allows a signer to generate a digital signature that can be verified by others, ensuring the authenticity and integrity of […]
Read MoreMore TagPost-Quantum Cryptography with curl
At wolfSSL, our commitment to advancing post-quantum cryptography (PQC) is stronger than ever. With the rise of quantum computing threats, securing data from “harvest now, decrypt later” attacks is a critical focus for us. That’s why we are actively enhancing curl with robust PQC support to safeguard your communications well into the quantum era. wolfSSL […]
Read MoreMore TagPost-Quantum Benchmark Comparison: ML-KEM wolfSSL 5.8.0 vs. OpenSSL 3.5
Recently, both OpenSSL 3.5 and wolfSSL 5.8.0 have been released. We thought we’d run some benchmarks on an x86_64 Linux PC. Note: output has been edited for brevity and clarity. OpenSSL Configuration and build: $ ./Configure $ make all Benchmarking Output: 47317 ML-KEM-512 KEM keygen ops in 0.99s 72114 ML-KEM-512 KEM encaps ops in 1.00s […]
Read MoreMore Tag
