ML-KEM (Module-Lattice Key Encapsulation Mechanism) and HQC (Hamming Quasi-Cyclic) are both post-quantum cryptographic key encapsulation mechanisms (KEMs) designed to provide secure key exchange in the presence of CRQCs (Cryptographically Relevant Quantum Computers). ML-KEM is based on the (M-LWE) Module Learning With Errors problem, which involves finding a short vector between two points in a high […]
Read MoreMore TagCategory: Post-Quantum
Coming soon: HQC KEM
Hello there! You! We know you are out there. You learned about Hamming codes in college or university, and maybe even use them in your professional career in consumer electronics or telecommunications. Now you are wondering how simple error correcting codes can be transformed into a KEM (Key Encapsulation Mechanism) for doing secure key transport. […]
Read MoreMore TagML-KEM Versus ML-DSA
ML-KEM (Module Lattice Key Encapsulation Mechanism) is for secure key exchange. ML-KEM enables two parties to establish a shared secret key over an insecure channel. ML-DSA (Module Lattice Digital Signature Algorithm) is for authentication. ML-DSA allows a signer to generate a digital signature that can be verified by others, ensuring the authenticity and integrity of […]
Read MoreMore TagPost-Quantum Cryptography with curl
At wolfSSL, our commitment to advancing post-quantum cryptography (PQC) is stronger than ever. With the rise of quantum computing threats, securing data from “harvest now, decrypt later” attacks is a critical focus for us. That’s why we are actively enhancing curl with robust PQC support to safeguard your communications well into the quantum era. wolfSSL […]
Read MoreMore TagPost-Quantum Benchmark Comparison: ML-KEM wolfSSL 5.8.0 vs. OpenSSL 3.5
Recently, both OpenSSL 3.5 and wolfSSL 5.8.0 have been released. We thought we’d run some benchmarks on an x86_64 Linux PC. Note: output has been edited for brevity and clarity. OpenSSL Configuration and build: $ ./Configure $ make all Benchmarking Output: 47317 ML-KEM-512 KEM keygen ops in 0.99s 72114 ML-KEM-512 KEM encaps ops in 1.00s […]
Read MoreMore TagLMS in wolfPKCS11
wolfSSL is excited to announce upcoming support for the Leighton-Micali Signature (LMS) scheme in wolfPKCS11. This implementation builds upon our existing LMS support in wolfCrypt to provide a complete PKCS#11 API interface for LMS operations. LMS, a stateful hash-based signature scheme standardized in RFC 8554 and approved by NIST SP 800-208, is already incorporated into […]
Read MoreMore TagOur Post-Quantum Value Proposition
Research-focused cryptography startups deserve a lot of credit for the innovative work they do. They enrich the community and introduce solutions that may become crucial in the future. But their expertise is largely theoretical and academic, not practical and customer-aligned. wolfSSL, in contrast, is staffed by dedicated engineers with decades of experience delivering production quality […]
Read MoreMore TagDeprecation Notice: liboqs Integration
Soon wolfSSL will no longer utilize the liboqs library. This change is intended to simplify the maintenance of the wolfSSL codebase by reducing the line count. The wolfSSL library already provides its own implementations of post-quantum algorithms, including Kyber and Dilithium. To enable these algorithms, users can simply configure wolfSSL with the following options: –enable-kyber […]
Read MoreMore TagPost-Quantum CAVP Validations
Here at wolfSSL we love it when our partners achieve great things. We’d like to give a big shout out to our friends at Crypto4A for achieving a huge milestone by getting their CAVP (Cryptographic Algorithm Validation Program) validation. The details can be found here. In summary, they got a Hardware validation for the QASM […]
Read MoreMore TagIs post-quantum cryptography still on the roadmap?
In case you were wondering, the answer is a resounding YES!! We’ve been hard at work making post-quantum algorithms first class citizens in our products. Have a look at the list of post-quantum related changes made in our latest release of wolfSSL 5.7.4: Replaced the use of pqm4 with wolfCrypt’s implementations of Kyber (ML-KEM) and […]
Read MoreMore Tag
