As cybersecurity standards continue to evolve, FIPS 140-3 is set to become the cornerstone of government security compliance, offering stronger assurances for cryptographic security. To help you stay ahead of these requirements and implement robust solutions, we’re excited to invite you to our upcoming webinar: FIPS 140-3 and CNSA 2.0 Compliance in a Single Connection. […]
Read MoreMore TagCategory: Uncategorized
Suite B Versus CNSA 1.0 Versus CNSA 2.0
With the CNSA (Commercial National Security Algorithm) 2.0 Suite coming into sharp focus recently, we thought we would talk about the history of how we got here and then focus on the differences between the various suites that came before it. The first time the NSA came out with a suite of algorithms to be […]
Read MoreMore TagRepurposing ESP32 Devices for Enhanced Security: Insights from wolfSSL at Hackaday 2024
We’re excited to announce that wolfSSL will be attending the 2024 Hackaday Superconference from November 1st to 3rd in sunny Pasadena, California, as a featured speaker! Don’t miss our insightful talk, “Repurposing ESP32 Based Commercial Products,” where you’ll learn how to secure ESP32 devices and turn them into HomeKit compatible tools by flashing custom software […]
Read MoreMore TagLive Webinar in the European Time Zone: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications
In the rapidly evolving automotive industry, ensuring data integrity, confidentiality, and authenticity is paramount. Hardware Security Modules (HSMs) play a critical role in this process by providing robust protection for cryptographic keys and secure data processing. Register today: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications in the European Time Zone Date: October […]
Read MoreMore TagwolfSSL wolfCrypt CSharp wrapper
wolfSSL is excited to announce additional support for wolfCrypt API’s in our CSharp (C#) wrapper. Our CSharp wrapper now includes wolfCrypt support for ECC (ECDSA/ECDHE), ECIES, RSA, ED25519/Curve25519, AES-GCM, and HASH cryptographic algorithms. The supported HASH algorithms are MD2, MD4, MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512, SHA-MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2B, and BLAKE2S. In […]
Read MoreMore TagEnhance Embedded System Security with ADI MAXQ1065 and wolfSSL
wolfSSL’s trusted partner, Analog Devices, Inc. (ADI), recently announced that integrating the MAXQ1065 with wolfSSL can significantly enhance security for IoT and embedded systems. Explore the ADI Engineer Zone blog post, Securing IoT and Embedded Systems: Integrate MAXQ1065 with wolfSSL, to discover wolfSSL’s competitive advantages and how this integration improves IoT security solutions and embedded […]
Read MoreMore TagLive Webinar: Automotive Hardware Security Modules: Functionality, Design, and Applications
In the fast-evolving automotive industry, securing data integrity, confidentiality, and authenticity is crucial. Hardware Security Modules (HSMs) are essential tools, offering robust protection for cryptographic keys and processing. Register Today: Automotive Hardware Security Modules: Functionality, Design, and Application Date: October 7th | 8 AM PT We invite you to an upcoming webinar, where Bill will […]
Read MoreMore TagFIPS-Certified WireGuard: Bringing wolfCrypt into the VPN Solution
As WireGuard continues to grow in popularity for its simplicity and efficiency in VPN deployments, security-conscious organizations are increasingly demanding solutions that adhere to stringent security standards, such as the Federal Information Processing Standard (FIPS 140-3). FIPS certification is a key requirement for governmental agencies and industries like healthcare and finance, where secure cryptographic implementations […]
Read MoreMore TagSupport for the Official Post-Quantum Standards ML-KEM and ML-DSA
Just a little while back to much fanfare, NIST-release these standards: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf They are the post-quantum algorithms that are now standardized for use!! As a quick summary: Kyber became ML-KEM (Module Lattice Key Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document. Dilithium became ML-DSA (Module Lattice Digital Signature Algorithm) which is […]
Read MoreMore TagLive Webinar: Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx
Explore how wolfSSL enhances security on Xilinx Devices in an upcoming webinar. Join wolfSSL software Developer Jacob Barthelmeh in our live webinar, Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx, on October 2nd at 10am PT. Dive into the world of secure embedded systems and discover how to optimize wolfSSL for […]
Read MoreMore Tag
