Infineon and wolfSSL recently announced their collaborative Commitment to Trusted Computing. wolfTPM is designed for embedded use and leverages all features in the TPM 2.0 specification. wolfTPM is ideal for resource constrained devices and runs on Windows, Linux, RTOS, and bare metal environments. The Infineon OPTIGA TPM SLB 9672 supports Microsoft Windows and Linux environments. […]
Read MoreMore TagCategory: Uncategorized
Yocto vs Buildroot: Build Systems to Tailor an Embedded Linux Solution
Yocto and Buildroot are powerful solutions designed to manage the complexities of deploying embedded products. Unlike general-purpose distributions such as Ubuntu or Red Hat Enterprise Linux, these systems allow for highly targeted deployments tailored specifically for embedded devices. General Functionality of Both: Compiling from Source: They both handle compiling the kernel, system libraries, bootloader, and […]
Read MoreMore TagwolfCrypt implementations of LMS/HSS and XMSS/XMSS^MT signatures: build options and benchmarks (Intel x86)
At wolfSSL we’re excited about stateful hash-based signature schemes and the CNSA 2.0, and we just had a webinar on this subject. If you recall, previously we added initial support for LMS/HSS and XMSS/XMSS^MT, through external integration with the hash-sigs and xmss-reference implementations. Recently however we have completed our own wolfCrypt implementations of these algorithms, […]
Read MoreMore TagLive Webinar: Linux Kernel Module with FIPS 140-3
Watch our webinar, “Linux Kernel Module with FIPS 140-3.” The session will be led by wolfSSL Senior Software Engineer Daniel Pouzzner. In this webinar, you’ll learn the fundamentals of how the wolfSSL Library functions as a Linux kernel module and explore advanced features, including how developers can utilize it with FIPS 140-3. Check it out […]
Read MoreMore TagEverything wolfSSL is Preparing for Post-Quantum as of Spring 2024
We’ve done a lot to enable post quantum cryptography in our products over the last 3 years. The list below outlines everything we have available, in open source, for users right now. If you see something on the list that you have questions about, or think there is some further enablement that we should do, […]
Read MoreMore TagDifference between Pseudorandom Number Generators and True Random Number Generators
Pseudorandom Number Generators (PRNGs) and True Random Number Generators (TRNGs) are both used to generate “random” sequences of numbers that can be used as input in a wide variety of applications. The key distinction between the two lies in how they generate randomness. PRNGs employ deterministic algorithms and an initial seed value to generate sequences […]
Read MoreMore TagwolfBoot vs u-boot: Comparing Secure Boot Solutions for Embedded Systems
While working on wolfBoot, many people ask us, how is it different from u-boot, and how does it compare to it if I am designing a secure boot strategy for my embedded systems based on microprocessors. While taking the same role in embedded systems, wolfBoot and u-boot are two very different projects. As bootloaders, they […]
Read MoreMore TagWhat is the difference between CAVP and CMVP?
Ensuring the security of cryptographic modules is paramount world-wide, particularly in governments and regulated industries. The Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module Validation Program (CMVP) serve as cornerstones in this endeavor. The CAVP particularly focuses on validating individual cryptographic algorithms against the Federal Information Processing Standard or FIPS for short. The CAVP […]
Read MoreMore TagJoin Our Live Webinar: Advanced curl: Learn From the Founder, Daniel Stenberg
We’re thrilled to announce that Daniel Stenberg, the founder and lead developer of cURL and libcurl, will be hosting an exciting webinar. Join us for “Advanced curl.” This webinar is a must-attend for anyone eager to enhance their curl skills and explore its full potential. Check it out here: Advanced curl: Learn From the Founder, […]
Read MoreMore TagWhat’s the Difference Between Type 1 and CSfC?
NSA’s Type 1 encryption has long been the gold standard for protecting classified data. However Type 1 Encryptors can be impractical due to their stringent design requirements and long road to market. The CSfC program offers a more flexible alternative by integrating commercial-off-the-shelf solutions into a multi-layered solution providing redundancy, reducing likelihood of failure on […]
Read MoreMore Tag
