In the rapidly evolving automotive industry, ensuring data integrity, confidentiality, and authenticity is paramount. Hardware Security Modules (HSMs) play a critical role in this process by providing robust protection for cryptographic keys and secure data processing. Register today: wolfHSM: Automotive Hardware Security Modules – Functionality, Design, and Applications in the European Time Zone Date: October […]
Read MoreMore TagCategory: Uncategorized
wolfSSL wolfCrypt CSharp wrapper
wolfSSL is excited to announce additional support for wolfCrypt API’s in our CSharp (C#) wrapper. Our CSharp wrapper now includes wolfCrypt support for ECC (ECDSA/ECDHE), ECIES, RSA, ED25519/Curve25519, AES-GCM, and HASH cryptographic algorithms. The supported HASH algorithms are MD2, MD4, MD5, SHA, SHA-224, SHA-256, SHA-384, SHA-512, SHA-MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, BLAKE2B, and BLAKE2S. In […]
Read MoreMore TagEnhance Embedded System Security with ADI MAXQ1065 and wolfSSL
wolfSSL’s trusted partner, Analog Devices, Inc. (ADI), recently announced that integrating the MAXQ1065 with wolfSSL can significantly enhance security for IoT and embedded systems. Explore the ADI Engineer Zone blog post, Securing IoT and Embedded Systems: Integrate MAXQ1065 with wolfSSL, to discover wolfSSL’s competitive advantages and how this integration improves IoT security solutions and embedded […]
Read MoreMore TagLive Webinar: Automotive Hardware Security Modules: Functionality, Design, and Applications
In the fast-evolving automotive industry, securing data integrity, confidentiality, and authenticity is crucial. Hardware Security Modules (HSMs) are essential tools, offering robust protection for cryptographic keys and processing. Register Today: Automotive Hardware Security Modules: Functionality, Design, and Application Date: October 7th | 8 AM PT We invite you to an upcoming webinar, where Bill will […]
Read MoreMore TagFIPS-Certified WireGuard: Bringing wolfCrypt into the VPN Solution
As WireGuard continues to grow in popularity for its simplicity and efficiency in VPN deployments, security-conscious organizations are increasingly demanding solutions that adhere to stringent security standards, such as the Federal Information Processing Standard (FIPS 140-3). FIPS certification is a key requirement for governmental agencies and industries like healthcare and finance, where secure cryptographic implementations […]
Read MoreMore TagSupport for the Official Post-Quantum Standards ML-KEM and ML-DSA
Just a little while back to much fanfare, NIST-release these standards: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf They are the post-quantum algorithms that are now standardized for use!! As a quick summary: Kyber became ML-KEM (Module Lattice Key Encapsulation Mechanism) which is specified by NIST’s FIPS 203 document. Dilithium became ML-DSA (Module Lattice Digital Signature Algorithm) which is […]
Read MoreMore TagLive Webinar: Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx
Explore how wolfSSL enhances security on Xilinx Devices in an upcoming webinar. Join wolfSSL software Developer Jacob Barthelmeh in our live webinar, Everything You Ever Wanted to Know About How wolfSSL Runs on Xilinx, on October 2nd at 10am PT. Dive into the world of secure embedded systems and discover how to optimize wolfSSL for […]
Read MoreMore TagPost-Quantum wolfHSM on Aurix Tricore
The title says it all!! If you have been paying any attention at all to us here at wolfSSL, you will know that we are very proud of our wolfHSM product that already runs on the Aurix Tricore. What we have not been focusing on is the post-quantum algorithms that work with wolfHSM. Let’s use […]
Read MoreMore TagwolfSSH with X.509 Certificates
Did you know wolfSSH can use X.509 certificates in place of SSH public keys? wolfSSH supports RFC 6187, “X.509v3 Certificates for Secure Shell Authentication”. This uses wolfSSL’s certificate management for TLS, so the certificates may be checked against CRLs and OCSP. wolfSSH has been used in applications as a server where it needed to validate […]
Read MoreMore TagFIPS vs FedRAMP Compliance and Requirements
The wolfSSL team has noticed an uptick in questions about FedRAMP requirements. Today, we want to cover the differences between FIPS and FedRAMP. FIPS: The Federal Information Processing Standards (FIPS) stipulate security requirements for cryptographic modules, which wolfSSL Inc. meets with our wolfCrypt FIPS module. NIST and the CMVP then encourage all federal programs using […]
Read MoreMore Tag
