Initial results in porting wolfSSL to the mbed MCU

As previously stated here, wolfSSL is getting ported to the mbed chip.  We’ve done the initial build and the results were pretty good.  wolfSSL takes 2.9 kB of RAM (10% of total) and 63 kB of Flash (13%).  That includes the test driver code which is about 3 kB.  More information to follow!  If you’re interested in building wolfSSL for mbed (http://mbed.org/), let us know and we’ll be happy to support you.

TLS extension parsing race condition issue affects only OpenSSL, not wolfSSL

Hi!  If you’re wondering, as some are, whether there is any issues with wolfSSL for CVE-2010-3864, the TLS extension parsing race condition, then please note that this issue only affects OpenSSL, not wolfSSL.  CVE-2010-3864 is an issue specific to OpenSSL, which is an entirely different SSL library than wolfSSL.  This issue is not general to the TLS protocol, and has no relation to wolfSSL.

Embedded Web Server for AVR

The yaSSL Embedded Web Server for AVR has some optimizations our users might want to hear about:  Assembly code for the AVR and AVR 32 instruction sets in the SSL cryptography. Assembly code for the AVR 32 instruction set speeds up public key operation during the SSL handshake.  Need to use it?  Already using it?  Let us know if you need any help with further optimizations or find any bugs!

What’s the difference between wolfSSL Embedded SSL and OpenSSL?

Hi!  If you came to our site because you are considering wolfSSL as an alternative to OpenSSL, this blog post is your cheat sheet that details the differences between the two products:
 
1. Size:  With a 30-40k build size, wolfSSL is 20 times smaller than OpenSSL.  wolfSSL is a better choice for resource constrained environments.
2. Standards Support:  wolfSSL is up to date with the most current standards of TLS 1.2 with DTLS, which OpenSSL has yet to address.
3. Support for streaming media:  wolfSSL is up to date with the best current ciphers and standards for streaming media support.
4. Embedded systems support:  wolfSSL is the leading  SSL library for real time, mobile and embedded systems, by virtue of its breadth of platform support and successful implementations on embedded environments.
5. Commercial licensing available from the source of the code:  wolfSSL is available under proper commercial licenses direct from Montana, or under the GPL, whereas OpenSSL is available only under their unique license from multiple sources.
 
If you have further questions on how we compare ourselves to OpenSSL, please contact us at info@yassl.com.  

Securing Machine-to-Machine Communication with wolfSSL

Machine-to-machine communication takes place between both wired and wireless systems all around the world every day. As stated here, “M2M uses a device (sensor, meter, etc.) to capture an ‘event` (temperature, inventory level, etc.), which is relayed through a network (wireless, wired or hybrid) to an application (software program), that translates the captured event into meaningful information (e.g., items need to be restocked).”

M2M communication holds a very important part in many business actions and decisions an as such needs to be secured. If your device has a TCP/IP stack in place, SSL, specifically wolfSSL, is an optimal solution for this problem.

wolfSSL is a small and lightweight embedded SSL library, offering your M2M devices a security solution which fits inside your resource constraints. If you have questions or would like more information on how you can use yaSSL products to enhance your M2M communication, please contact info@yassl.com

Assembly-Based Performance Optimizations for ARM in wolfSSL

Earlier this week we stated our commitment to ARM by explaining our assembly code optimizations on a number of our math intensive cryptography operations. To give you more information, these optimizations are for Public Key operations with the CTaoCrypt fastmath option. This translates to a speed increase when using RSA, Diffie-Hellman, or DSA.

If you dive into our code, these optimizations can be found in the asm.c source file.

Today, Team yaSSL continues to exhibit at the ARM Technology Conference in Santa Clara, CA. If you are in the area, feel free to stop by our booth to visit or contact us at info@yassl.com with any questions.

The ARM Powered Corvette

The yaSSL booth at ARM TechCon is perfectly situated to check out the QNX based/ARM based Corvette on the show floor.  It’s a silver beauty!  See the pictures below.
 
Reminder:  if you’re building a QNX based car computer and need to secure it with small embedded SSL solution, then contact us.  One of the earliest wolfSSL users did just that, so we have some experience in the domain.

yaSSL lays plans to secure mbed based racing robots

Hi!  As you may know from reading our posts here, Team yaSSL is exhibiting at ARM TechCon this week.  What you may not know is that we’ve been working with ARM’s mbed.org team to facilitate a port of wolfSSL to mbed.  Why?  Because hobbyists need security too!  And it is fun. 
 
Here at ARM TechCon, mbed has paired with Pololu to create an mbed-based robot.  Additionally, these two companies have created a contest for developers to race the robots based on the program they write.  We’re going to help ensure a robot does not lose because its communication is subject to an MITM attack!

How to use the CTaoCrypt crypto library in standalone mode

Hi!  About 20% of our users are using CTaoCrypt to provide standalone cryptographic functionality, and about 80% of our users have not thought about using it that way.  The purpose of this blog post is to inform users on how to use CTaoCrypt as a standalone library:
 
1. CTaoCrypt is available as a function set within wolfSSL, licensed under GPL or commercially.  If you are interested in using it outside of wolfSSL, then let us know.  Basically this means that 100% of the CTaoCrypt functions are available through the wolfSSL API set. 
2. Support for various development environments is included in the download, including GCC, Visual Studio, and Xcode.
3. The build process is described in the README.  A program to test your build is included.
4. If you are a benchmark junkie, and since we know you probably are, we include a simple benchmark application to get you started.
5. CTaoCrypt has a lot of useful features, including: 

– AES-NI support for super fast AES on the newer intel chips. 
– One way hash functions: SHA-1, MD2, MD4, MD5, RIPEMD-160
– Message authentication codes: HMAC
– Block Ciphers: DES, Triple-DES, AES
– Stream Ciphers: ARC4, Rabbit and HC-128
– Public Key Crypto: RSA, DSA, Diffie-Hellman
– Password based key derivation: PBKDF2 from PKCS #5
– Pseudo Random Number Generators
– Large Integer Support
– Base 16/64 encoding/decoding
– DER encoding/decoding
– X.509 processing
– x86, x86_64, SSE2, ARM, PPC32, and PPC64 and AVR32
– Support for FastMath

6. If you need porting, support, or just regular help with CTaoCrypt, then get in contact with us at info@yassl.com.

SHODAN:  Sentient Hyper-Optimized Data Access Network automates port scanning, simplifies exploiting embedded devices

“The Register” reported on using SHODAN to pinpoint embedded devices that are not properly secured yesterday.  See http://www.theregister.co.uk/2010/11/02/scada_search_engine_warning/ for details.  In summary, SHODAN can be used to quickly identify internet connected devices with known exploits.  For us, it points to yet another reason why mobile and embedded systems developers should harden their devices with the wolfSSL embedded SSL library and the yaSSL Embedded Web Server.

Posts navigation

1 2 3 178 179 180 181 182 183 184 187 188 189