As artificial intelligence continues to evolve and transform industries, here at wolfSSL we are closely monitoring developments in Agent to Agent communication protocols such as A2A and SLIM. We recently wrote our blog post “A2A and wolfSSL” talking about how it is secured via TLS. One particularly interesting development in this space is SLIM (Secure […]
Read MoreMore TagCategory: Uncategorized
DICE Boot Chain Via wolfCrypt’s Minimal Binary Footprint
Device Identifier Composition Engine (DICE) represents a fairly simple approach to hardware-based device identity and secure boot. DICE creates Cryptographic Device Identities (CDIs) through a blockchain-like verification process, where each boot stage measures the next component and derives unique Compound Device Identifiers using the following formula: CDI_n = HMAC(CDI_n-1, Hash(program)) CDI_0 = UDS The formulas […]
Read MoreMore TagLive Webinar: Everything You Need to Know About Medical Device Cybersecurity – Tailored for the Asia-Pacific Time Zone
Elevate your cybersecurity strategy with proven solutions built for connected care. Join us on September 4th at 5 PM PT / September 5th at 9 AM JST for a live webinar led by wolfSSL Senior Software Engineer Eric Blankenhorn. We’ll cover how to strengthen cybersecurity across the entire medical device ecosystem from implantables and patient […]
Read MoreMore TagTop 15 FIPS Terms You Should Know – The Full Breakdown
We recently shared our top 15 FIPS acronyms and terms to help you get familiar with the basics. Now, let’s dive deeper into what each of these means and why they matter in the FIPS 140-3 certification process. FIPS – Federal Information Processing Standards FIPS are standards published by the U.S. federal government that specify […]
Read MoreMore TagTop 15 FIPS Terms You Should Know
Working with FIPS 140-3 can get confusing fast, especially with all the acronyms involved. To help cut through the noise, here are our top 15 FIPS-related terms: FIPS – Federal Information Processing Standards NIST – National Institute of Standards and Technology CMVP – Cryptographic Module Validation Program CAVP – Cryptographic Algorithm Validation Program ESV – […]
Read MoreMore TagwolfMQTT: Using wolfCrypts implementation of ML-KEM and ML-DSA
A long time ago, we added support for Kyber and Falcon in wolfMQTT. That support used an integration into liboqs for the Kyber and Falcon implementation. Things have changed since then! Kyber is no longer Kyber, it is now ML-KEM. Falcon will soon become FN-DSA, but since then rock solid standards for ML-DSA have been […]
Read MoreMore TagOpenSSL Compatibility Layer Additions in wolfSSL 5.8.2
The wolfSSL’s repo pull request #8897 adds significant OpenSSL compatibility layer enhancements across four key areas: RSA operations, big number mathematics, X.509 certificate extensions, and private key serialization. RSA API Enhancements: The PR introduces comprehensive RSA-PSS (Probabilistic Signature Scheme) support with enhanced OpenSSL compatibility. Key additions include: wolfSSL_EVP_PKEY_CTX_set_rsa_pss_saltlen() for configuring salt lengths wolfSSL_EVP_PKEY_CTX_set_rsa_mgf1_md() for setting […]
Read MoreMore TagLive Webinar: WolfGuard: FIPS 140-3 Enabled WireGuard
WireGuard is known for its simplicity, speed, and modern cryptography, but what if your deployment requires FIPS 140-3 validated security? That’s where WolfGuard comes in. Join wolfSSL Software Engineer Lealem Amedie as he introduces WolfGuard, a FIPS 140-3 enabled WireGuard solution optimized for speed and cryptographic agility. Built on the FIPS-certified wolfCrypt library, WolfGuard delivers […]
Read MoreMore TagHow to Make Your TPM Talk PKCS11
TPM vs HSM, what’s the difference? Check out this blog post for more detailed. In a nutshell, TPMs are typically a dedicated chip included along side a main (host) processor and used for securing a single consumer electronics device. HSMs are external devices that can be used across multiple devices and systems, offering advanced cryptographic […]
Read MoreMore TagwolfSSL’s Newest Offering for the Financial Vertical
Are you wondering what Microsoft’s roadmap for the IIS (Internet Information Services) webserver says about post-quantum cryptography? We’re not; read on to find out why. Not everyone in the financial industry is old enough to remember what it was like to be in the trenches during the Y2K (Year 2000) era, but those that were […]
Read MoreMore Tag
