Hi! It is rare for a cryptography algorithm to make the pages of the popular press, but Dual_EC_DRBG has done just that! The best article we`ve seen to date is Kim Zetter`s lucid article in Wired: https://www.wired.com/2013/09/nsa-backdoor/. For the record, we have never implemented the Dual_EC_DRBG algorithm, nor gone so far as to set it […]
Read MoreMore TagCategory: Uncategorized
Implementation and Performance of AES-NI in wolfSSL Lightweight SSL
Do you have a processor and compiler which support Intel’s AES-NI? If so, you can take advantage of the increase in performance provided by AES-NI in CyaSSL and wolfCrypt. wolfSSL has worked with Intel to publish a white paper describing how Intel’s AES-NI can be used with the CyaSSL embedded SSL library. This paper provides […]
Read MoreMore TagwolfSSL STM32 Hardware Crypto and RNG Support
Did you know that the CyaSSL lightweight SSL library has support for hardware-based cryptography and random number generation offered by the STM32 processor? Supported cryptographic algorithms include AES (CBC, CTR), DES (ECB, CBC), 3DES, MD5, and SHA1. For details regarding the STM32 crypto and hash processors, please see the STM32F2xx Standard Peripheral Library document (linked […]
Read MoreMore TagCyaSSL Release 2.8.0 Now Available
The bi-monthly release of CyaSSL, 2.8.0, is now ready to download from our website. New features include: – AES-GCM and AES-CCM use AES-NI – NetX default IO callback handlers – IPv6 fixes for DTLS Hello Cookies – The ability to unload Certs/Keys after the handshake, CyaSSL_UnloadCertsKeys() – SEP certificate extensions – Callback getters for easier […]
Read MoreMore TagRecent Security Compromise in Android Apps using Java Cryptography Architecture (JCA)
Earlier this month, Google announced that a security compromise had been found which affects applications that improperly initialize, or fail to initialize completely, the PRNG (pseudorandom number generator) before using it for key generation, signing, or random number generation. On the Android Developers Blog, Alex Klyubin, Android Security Engineer, stated that “We have now determined […]
Read MoreMore TagCyaSSL and SEP 2.0
Hi! If you are interested in IoT and specifically security of IoT, then you’ll probably like this article on SEP 2.0. SEP stands for Smart Energy Profile. This note is just to let our users know that we’re following the evolution of the standard as it relates to SSL/TLS, and have provided our CyaSSL embedded […]
Read MoreMore TagUsing CyaSSL with Cavium NITROX Security Processors
CyaSSL now supports the Cavium NITROX processors, thus enabling CyaSSL users to take advantage of the incredible performance boosts provided by the NITROX family. Cavium’s NITROX processors combine cryptographic acceleration with the latest security algorithms. The NITROX PX family can deliver performance ranging from 500 Mbps to 2.5 Gbps for full SSL protocol offload, and […]
Read MoreMore TagFreeRTOS Web Server
Hi! wolfSSL`s Secure Embedded Web Server is now available for FreeRTOS. Let us know if you`re interested at facts@wolfssl.com.
Read MoreMore TagwolfSSL Fan Art by Steve Barker
Here at wolfSSL, we’re always excited to see fan art! Today we’d like to thank Steve Barker (https://plus.google.com/103515628980768116177/posts) for the rendition of our logo and tagline!
Read MoreMore TagKyle Wilhoit`s Industrial Control Honeypots presentation from Black Hat
One of the consistent themes at Black Hat is attacks on industrial control systems; which includes water plants, power plants, and oil refineries. One of the presentations was centered around using honeypots to determine the level of attack activity. An excellent article on the presentation and related material can be found here: http://gcn.com/Articles/2013/08/07/ics-honeypots.aspx?s=security_080813&admgarea=TC_SecCybersSec&Page=1 Some of […]
Read MoreMore Tag
