Watch our webinar, “Post-Quantum Algorithms in cURL.” The session will be led by wolfSSL Senior Software Developer Anthony Hu. In this session, Anthony will cover a wide range of topics, from the fundamental concepts of post-quantum algorithms, including the CNSA 2.0 timelines and the concept of “Harvest Now, Decrypt Later,” to a demonstration on how […]
Read MoreMore TagCategory: Uncategorized
TLS Session ID vs Tickets
All versions of the Transport Layer Security (TLS) protocol support resuming previously established connections. The keying material previously negotiated is re-used in the new connection. The major benefits of resuming sessions are the much shorter handshake and not having to recompute session keys. In embedded systems, both of these advantages are critical to decrease the […]
Read MoreMore TagAnnouncing wolfSSL TPM support for the Espressif ESP32
Infineon and wolfSSL recently announced their collaborative Commitment to Trusted Computing. wolfTPM is designed for embedded use and leverages all features in the TPM 2.0 specification. wolfTPM is ideal for resource constrained devices and runs on Windows, Linux, RTOS, and bare metal environments. The Infineon OPTIGA TPM SLB 9672 supports Microsoft Windows and Linux environments. […]
Read MoreMore TagYocto vs Buildroot: Build Systems to Tailor an Embedded Linux Solution
Yocto and Buildroot are powerful solutions designed to manage the complexities of deploying embedded products. Unlike general-purpose distributions such as Ubuntu or Red Hat Enterprise Linux, these systems allow for highly targeted deployments tailored specifically for embedded devices. General Functionality of Both: Compiling from Source: They both handle compiling the kernel, system libraries, bootloader, and […]
Read MoreMore TagwolfCrypt implementations of LMS/HSS and XMSS/XMSS^MT signatures: build options and benchmarks (Intel x86)
At wolfSSL we’re excited about stateful hash-based signature schemes and the CNSA 2.0, and we just had a webinar on this subject. If you recall, previously we added initial support for LMS/HSS and XMSS/XMSS^MT, through external integration with the hash-sigs and xmss-reference implementations. Recently however we have completed our own wolfCrypt implementations of these algorithms, […]
Read MoreMore TagLive Webinar: Linux Kernel Module with FIPS 140-3
Watch our webinar, “Linux Kernel Module with FIPS 140-3.” The session will be led by wolfSSL Senior Software Engineer Daniel Pouzzner. In this webinar, you’ll learn the fundamentals of how the wolfSSL Library functions as a Linux kernel module and explore advanced features, including how developers can utilize it with FIPS 140-3. Check it out […]
Read MoreMore TagEverything wolfSSL is Preparing for Post-Quantum as of Spring 2024
We’ve done a lot to enable post quantum cryptography in our products over the last 3 years. The list below outlines everything we have available, in open source, for users right now. If you see something on the list that you have questions about, or think there is some further enablement that we should do, […]
Read MoreMore TagDifference between Pseudorandom Number Generators and True Random Number Generators
Pseudorandom Number Generators (PRNGs) and True Random Number Generators (TRNGs) are both used to generate “random” sequences of numbers that can be used as input in a wide variety of applications. The key distinction between the two lies in how they generate randomness. PRNGs employ deterministic algorithms and an initial seed value to generate sequences […]
Read MoreMore TagwolfBoot vs u-boot: Comparing Secure Boot Solutions for Embedded Systems
While working on wolfBoot, many people ask us, how is it different from u-boot, and how does it compare to it if I am designing a secure boot strategy for my embedded systems based on microprocessors. While taking the same role in embedded systems, wolfBoot and u-boot are two very different projects. As bootloaders, they […]
Read MoreMore TagWhat is the difference between CAVP and CMVP?
Ensuring the security of cryptographic modules is paramount world-wide, particularly in governments and regulated industries. The Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module Validation Program (CMVP) serve as cornerstones in this endeavor. The CAVP particularly focuses on validating individual cryptographic algorithms against the Federal Information Processing Standard or FIPS for short. The CAVP […]
Read MoreMore Tag
