Is TLS False Start going to take off?

TLS requires both end points to have received and processed their peer`s Change Cipher Spec and Finished messages before starting to transfer their bulk encrypted data. It needs the Finished message to validate its peer`s identify. To save one round-trip time, an endpoint after having sent its Finished message could start sending its encrypted data […]

Read MoreMore Tag

CTaoCrypt will be changing to wolfCrypt

We would like to give our users an early heads up that our cryptography library, CTaoCrypt will soon be changing names to wolfCrypt. With the name change, there may be some changes to the existing crypto API. You’ll also begin to see changes in our documentation and website. If you have any questions about the […]

Read MoreMore Tag

wolfSSL adds support for SHA-3 finalist BLAKE

wolfSSL now supports BLAKE2b hashes at the cryptographic level.  Support for digest sizes from 256bits – 512 bits is included.  BLAKE was one of 5 finalists for the NIST hash competition to pick SHA-3.  BLAKE2 is an improved version that simplifies software implementations and has great speed while consuming little resources, a perfect fit for […]

Read MoreMore Tag

DTLSv1.2 Now Available in wolfSSL

We have added DTLSv1.2 to wolfSSL. The latest sources are available in our GitHub repository. To enable DTLSv1.2 in wolfSSL, configure the build with the option “–enable-dtls”. We are very excited to offer this new protocol. If you are interested in discussing the cipher suites available for DTLSv1.2, please contact us at facts@wolfssl.com.

Read MoreMore Tag

wolfSSL, provider of CyaSSL Embedded SSL, releases first embedded TLS and DTLS protocol fix for Lucky Thirteen Attack

Researchers have found a new a new attack vector for TLS 1.1 and 1.2 protocol implementations, which wolfSSL has promptly fixed in its leading embedded TLS product. In the paper “Lucky Thirteen: Breaking the TLS and DTLS Record Protocols” authors Nadhem AlFardan and Kenneth Paterson present a family of attacks that apply to CBC-mode for […]

Read MoreMore Tag

wolfSSL 2.5.0 is Now Available

Release 2.5.0 of the wolfSSL lightweight SSL/TLS library has been released and is now available for download. This release has bug fixes and new features including: – Fix for TLS CBC padding timing attack identified by Nadhem Alfardan and Kenny Paterson: http://www.isg.rhul.ac.uk/tls/– Microchip PIC32 (MIPS16, MIPS32) support– Microchip MPLAB X example projects for PIC32 Ethernet […]

Read MoreMore Tag

Camellia Cipher Now Available in wolfSSL

We have added the Camellia-CBC cipher to CTaoCrypt and wolfSSL. The following cipher suites are available for TLS: • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 Camllia-CBC will be available in our next release. The latest sources are available in our GitHub repository. To enable Camellia-CBC in […]

Read MoreMore Tag

Posts navigation

1 2 3 189 190 191 192 193 194 195 215 216 217