Advantages of Using wolfSSL on RISC-V Platforms One of the key benefits of using wolfSSL in a RISC-V project is that the library has been developed in a “clean room” environment. In part, this means there’s no inherited code baggage and more importantly: no external dependencies. If there’s an existing RISC-V project, wolfSSL can be […]
Read MoreMore TagCategory: Uncategorized
What is FIPS? (Quick Overview)
Doing FIPS responsibly since 2014! The wolfCrypt module now holds the world’s first SP800-140Br1 FIPS 140-3 Validated Certificate #4718. FIPS is a set of standards, detailed in Special Publications, that need to be met in order to be awarded a FIPS validation/certification published on the NIST website. A FIPS certificate, with the product listed in […]
Read MoreMore TagLive Webinar: Reasons to migrate from OpenSSL to wolfSSL
If you’re looking for a superior alternative to OpenSSL that offers better support and a smoother workflow, wolfSSL is the solution you need. It not only addresses the gaps you may encounter with OpenSSL but also boasts the world’s first SP800 140Br1 FIPS 140-3 validated certificate (#4718) for its wolfCrypt module. Join our upcoming webinar, […]
Read MoreMore TagWhat is FIPS? (In-Depth Overview)
Doing FIPS responsibly since 2014! The wolfCrypt module now holds the world’s first SP800-140Br1 FIPS 140-3 Validated Certificate #4718. INTRO (wolfSSL FIPS service(s)): (skip to next paragraph for “What is FIPS”) FIPS is rightly viewed as a complex process with a steep entry learning curve. Lucky for customers of wolfSSL Inc. our management and engineering […]
Read MoreMore TagwolfSSL Invited to the White House Post-Quantum Standards Announcement
Our very own Tim Pickering was in attendance today when White House officials announced that the standards for post-quantum algorithms were no longer in draft mode. They are now fully empowered as standard algorithms and endorsed by the US Federal Government. What was standardized today? FIPS-203 ML-KEM FIPS-204 ML-DSA FIPS-205 SLH-DSA Here at wolfSSL we’ve […]
Read MoreMore TagKeystores and Secure Elements supported by wolfSSL
When looking to store your cryptographic secrets, it is important to have a good platform to store them on. Even more important is the ease of accessing and using those secrets. With wolfTPM, we have support for all TPM 2.0 APIs. Additionally, we provide the following wrappers: Key Generation/Loading RSA encrypt/decrypt ECC sign/verify ECDH NV […]
Read MoreMore TagwolfSSL Invited to the White House Post-Quantum Standards Announcement
Our very own Tim Pickering was in attendance today when White House officials announced that the standards for post-quantum algorithms were no longer in draft mode. They are now fully empowered as standard algorithms and endorsed by the US Federal Government. What was standardized today? FIPS-203 ML-KEM FIPS-204 ML-DSA FIPS-205 SLH-DSA Here at wolfSSL we’ve […]
Read MoreMore TagHow do you benchmark cryptography?
There are many different metrics that can be used when benchmarking cryptography. The common metrics are; average time per operation, average amount of data processed per unit of time, and number of clock cycles taken per data processed. The first metric of average time per operation, is used with asymmetric key algorithms. These are algorithms […]
Read MoreMore TagLive Webinar: Getting Started with libcurl
Join us for an insightful live webinar with Daniel Stenberg, the founder and lead developer of curl and libcurl, on August 15th at 10 am PT. Daniel will present “Getting Started with libcurl” for all skill levels. In this session, Daniel will delve into the core concepts and best practices of libcurl, the widely known […]
Read MoreMore TagCNSA 2.0 Update Part 5: PSK
On April 18th, 2024, the NSA released updates and clarifications to their CNSA 2.0 (Commercial National Security Algorithm Suite 2.0) advisory in the form of an FAQ. This is the fifth and final in a series of postings about the questions and answers that we feel are most interesting and our reactions to them. Q: […]
Read MoreMore Tag
