Our third post in our PKCS series, we will be looking at PKCS #5. PKCS #5 is the Password-Based Cryptography Specification and is currently defined by version 2.0 of the specification. It is defined in RFC 2898 http://tools.ietf.org/html/rfc2898. It applies a pseudorandom function, such as a cryptographic hash, cipher, or HMAC to the input password or passphrase […]
Read MoreMore TagCategory: Uncategorized
Video Tutorial: Basic Compilation and Installation of CyaSSL
If you are looking for a quick and easy guide on compiling, installing and using CyaSSL, then we have some good news: In order to make it even easier to understand and install CyaSSL, we recently created a video tutorial to help get you started. The video will walk you through the downloading and installing […]
Read MoreMore TagIntegrating ChaCha20 and Poly1305 Into wolfSSL
We`ve implemented ChaCha20 allowing for the use of both 128 bit and 256 bit keys and are in the process of implementing Poly1305 into wolfSSL. Both crypt tools and a suite using the two are on schedule to be released by the end of the summer. The ChaCha20 and Poly1305 algorithms, originally developed by Bernstein, […]
Read MoreMore TagUsing wolfSSL on Raspberry Pi
Did you know that the wolfSSL lightweight SSL library builds and runs out of the box on the Raspberry Pi? We recently ran tests on a Raspberry Pi model B with wolfSSL 3.0.0. You can check out the results below: 1. Downloading For the test, we downloaded cyassl-3.0.0.zip file from our download page. 2. Building […]
Read MoreMore TagwolfSSL and Oculus Rift
Hi everyone, we’re curious if anyone is interested in using wolfSSL with the Oculus Rift? If you don’t know what an Oculus Rift is, it is a Next Generation Virtual Reality Technology for video games or any Virtual Reality Applications. You can learn more at the following URL: http://www.oculusvr.com/ If you have any questions, or […]
Read MoreMore TagwolfSSL and CyaSSL Users SAFE from Recent OpenSSL Security Advisories
OpenSSL released several security advisories yesterday: http://www.openssl.org/news/secadv_20140605.txt. None of these are attacks on the SSL/TLS protocols themselves. They are all implementation bugs. Most are critical bug fixes to DTLS (TLS over UDP). As a clean room implementation of SSL, wolfSSL does not use any OpenSSL code and is free from these defects. The most critical […]
Read MoreMore TagSupport for AES-NI in Visual Studio
Hi! We`ve been supporting AES-NI for a few years now. We`ve decided to extend that support to Visual Studio users. If you would like to use AES-NI with Visual Studio, then let us know. Beta code will be available shortly. Contact us at facts@wolfssl.com if you have questions.
Read MoreMore TagwolfSSL Releases IoT Demo of CyaSSL Working with Xively and mbed
For those of you interested in how CyaSSL fits into IoT, here is an example you should take a look at! We have prepared a demo with CyaSSL, Xively, and mbed. It runs on various mbed platforms with Ethernet connections, including NXP LPC1768 whose RAM size is as small as 32k for applications + 32k for […]
Read MoreMore TagwolfSSL Enforces Stack Usage Reduction
Understanding the stack and the heap are fundamental steps for all software developers. The importance of such understanding is inversely proportional to the amount of memory available on the platform, as both compete for a piece of the total memory space available on a system. In some cases the developer has the choice of when […]
Read MoreMore TagwolfSSL with TLS 1.3
Hi! Some of you know that the IETF working group on TLS is creating the specification for TLS 1.3. We plan to upgrade wolfSSL to the TLS 1.3 specification as soon as the spec is finalized, or even close to finalized. We are always aggressive with implementing the new TLS specifications, because we like to […]
Read MoreMore Tag
