Last year, we were thrilled to announce our support for DTLSv1.3 – we are the first to have a working implementation. 2023 promises to be just as exciting for DTLSv1.3 as 2022 as we already have a number of features planned for the coming months. One of the things we are focusing on is better […]
Read MoreMore TagCategory: Uncategorized
Looking for Post-Quantum Features
2023 has just begun and a new year means new features for wolfSSL products. We want to hear from you. What kind of post-quantum features are you looking for? Here are some products we are thinking of updating: wolfSSL: hybrid authentication schemes. wolfSSL: support for post-quantum algorithms on more embedded platforms. wolfSSL: stateful-hash based signature […]
Read MoreMore TagSSL/TLS Support for NXP SE050 with wolfSSL
The wolfSSL lightweight SSL/TLS library and underlying wolfCrypt cryptography library have included support for the NXP SE050 secure element as of November 2021. Since that time we have been increasing compatibility with SE050 along with usage of SCP03 (Secure Channel Protocol 03) authentication. We recently made a few fixes for usage of the NXP SE050 […]
Read MoreMore TagJoin us at Fosdem 2023
In a matter of days, hundreds of Open Source developers will gather in Brussels, Belgium for FOSDEM 2023. FOSDEM is a two day event organized by volunteers to promote the widespread use of Open Source software, and is considered by many to be the best open source conference in Europe [1]. wolfSSL will be attending […]
Read MoreMore TagwolfBoot support for the STM32C0
We are adding wolfBoot support for the new STM32C0. This is a low cost MCU similar to the STM32G0 based on a Cortex-M0 (48MHz). It is a very low cost general purpose 32-bit MCU with up to 32KB flash and 12KB RAM. Our wolfBoot secure bootloader is the only solution available for this platform thanks […]
Read MoreMore TagKEMTLS Experimentation Via wolfSSL
A new, exciting paper has been released by Ruben Gonzalez from Neodyme AG and Thom Wiggers from Radboud University. They compare post-quantum algorithms in TLS 1.3 and KEMTLS. KEMTLS is a newly proposed modification to the TLS 1.3 protocol that would eliminate the need for signing operations during a handshake protocol. Note that a long […]
Read MoreMore TagwolfEngine 1.3.0 Released
We’re happy to announce that wolfEngine 1.3.0 has been released! wolfEngine is an OpenSSL engine implementation that helps users migrate to a FIPS-validated cryptography library (wolfCrypt) all while continuing to use OpenSSL. Version 1.3.0 includes support for RPM packaging, support and tests for OpenSSL HMAC operations to be called with a -1 key length, and […]
Read MoreMore TagRust Crate for Post-Quantum TLS 1.3 and wolfSSL
Are you on the bleeding edge of software development and cryptographic protocols? Then you’ll appreciate the work that our friends at ExpressVPN have done by creating a rust crate for wolfSSL with bindings into our API. They have even created a special feature flag called “postquantum” which enables our integration with liboqs. In fact, this […]
Read MoreMore TagDTLS 1.3 support for Post-Quantum Cryptography
Do you want to start using wolfSSL’s DTLS 1.3 implementation? Want to go even further? A great reason to start using our DTLS 1.3 stack is that it also supports post-quantum KEMs, Hybrid KEMs and post-quantum signature schemes. When it comes time to move to post-quantum standards, support for them will likely come in […]
Read MoreMore TagwolfSSL: Hardened By Default
In cryptography when we talk about hardening a library, we mean enabling resistance to timing attacks and cache attacks, using RSA blinding and protecting against glitching. Enabling and Disabling Our code has many related macros which can be controlled via configure script flags such as the harden flag and maxstrength flag. When hardening is enabled, […]
Read MoreMore Tag
