We are excited to announce wolfBoot support for the Renesas RZ/N2L evaluation board. The Renesas RZ/N2L uses the high-performance Arm Cortex-R52 core to easily add network functionality onto industrial equipment and machines. The RZ/N2L is supported by an open and flexible ecosystem concept – the Flexible Software Package (FSP), built on FreeRTOS – and is […]
Read MoreMore TagCategory: Uncategorized
wolfSSL Supports Nucleus RTOS
The Nucleus RTOS uses wolfSSL to provide TLS security. The wolfSSL embedded SSL library is a lightweight SSL/TLS library written in ANSI C and targeted for embedded, RTOS, and resource-constrained environments – primarily because of its small size, speed, and feature set. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.3 […]
Read MoreMore TagPost-Quantum Kyber Benchmarks (ARM Cortex-M4)
Hot on the heels of our MacOS benchmarks, we now have our Kyber Benchmarks for Arm Cortex-M4. Before getting into the numbers, some information on the conditions under which the benchmarks were taken: The hardware platform was STM NUCLEO-F446ZE The HCLK in the project was set to 168MHz Only 1 core used wolfSSL Math Configuration […]
Read MoreMore TagPost-Quantum Kyber Benchmarks (MacOS)
You may be aware that wolfSSL has our own implementation of NIST’s ML-KEM, also known as Kyber. ML-KEM is the post-quantum KEM that is slated for standardization by NIST. While the standard is not complete yet, and we have not yet released our implementation into open source, we do have some benchmarking results to share. […]
Read MoreMore TagLive Webinar: DTLS 1.3 Training
Join us for an exclusive webinar “DTLS 1.3 Training”, scheduled for March 7th at 10am PT. Presented by wolfSSL Software Developer, Marco, this session is your gateway to mastering DTLS 1.3, a groundbreaking protocol adopted by wolfSSL. As pioneers in TLS technology, wolfSSL is proud to stand as the first library to implement DTLS 1.3. […]
Read MoreMore TagCPU-Accelerated Cryptography on OpenWRT Using wolfSSL
OpenWRT is a customizable open-source firmware for wireless routers and embedded devices, offering extensive flexibility and control over network configurations. For those looking to enhance their device’s security capabilities with efficient cryptographic operations, integrating wolfSSL with CPU acceleration presents an excellent option. This setup is optimized for devices compatible with x86 and armv8 architectures, ensuring […]
Read MoreMore TagLive Webinar: Migrating from OpenSSL to wolfSSL in 2024
Join us for an informative webinar “Migrating from OpenSSL to wolfSSL” led by wolfSSL Software Developer, Jacob, on February 29th at 10am PT. Jacob will guide you through the seamless transition from OpenSSL to wolfSSL, introducing the wolfCrypt FIPS 140-3 module to meet OpenSSL FIPS requirements, along with the revolutionary wolfEngine and wolfProvider technologies tailored […]
Read MoreMore TagComparing wolfSSL vs OpenSSL
How does OpenSSL Compare with wolfSSL? There are a lot of different metrics to compare when choosing between two TLS libraries. Some of those include heap usage and performance. Heap Usage: For heap usage wolfSSL can be significantly smaller — using 100’s of kilobytes less to handle an incoming TLS connection. The following is comparisons […]
Read MoreMore TagwolfSSL SSL/TLS Support for NXP SE050
The wolfSSL lightweight SSL/TLS library and underlying wolfCrypt cryptography library have included support for the NXP SE050 module since November 2021. Since that time we have been increasing compatibility with SE050 along with usage of SCP03 (Secure Channel Protocol 03) authentication. To help users get started with TLS usage, we also have two example client […]
Read MoreMore TagwolfBoot support for the Xilinx Zynq UltraScale+ MPSoC
wolfBoot support for the Xilinx UltraScale+ was added in 2020 and is a direct U-Boot replacement for improved security. wolfBoot provides enhanced features compared to U-Boot such as: Firmware integrity and signature verification on each boot Image integrity checking SHA2-256 or SHA3-384. Validation of the signature using ECC P256/P384, RSA (2048-bit or 3072-bit), ED25519 and […]
Read MoreMore Tag
