wolfHSM and Concurrency

Systems that integrate an HSM often have multiple threads or subsystems performing cryptographic operations at the same time. wolfHSM is designed to support this kind of workload while keeping the request/response protocol simple and predictable. wolfHSM concurrency is primarily achieved by the server processing requests from multiple client sessions in parallel. Each session processes requests […]

Read MoreMore Tag

Securing wolfHSM POSIX Transport with TLS

The recent addition of a TLS transport to the wolfHSM project provides improved transport-level protection for POSIX-based communications and was included with the latest release. Previously, when wolfHSM was used over POSIX transports (such as TCP sockets on a local system), security largely depended on controlling access to that transport. If an attacker could access […]

Read MoreMore Tag

wolfHSM Support for Renesas RH850/U2A

Are you ready to secure your next-generation automotive systems? We are pleased to announce upcoming wolfHSM support for the Renesas RH850/U2A, leveraging the advanced capabilities of the ICU-M (Intelligent Cryptographic Unit Master) hardware security module. This integration delivers highly flexible security functionality through comprehensive utilization of the ICU-M’s capabilities. Getting started with wolfSSL? Download the […]

Read MoreMore Tag

What Is the Difference Between HSM, TPM, Secure Enclave, and Secure Element or Hardware Root of Trust?

HSMs, TPMs, Secure Enclaves, and Secure Elements are all dedicated security components that exist to service other devices. While at a high level they have similar security goals and intentions (e.g. private key isolation), they are not the same things, and they do have important differences. This blog post will guide the reader through what […]

Read MoreMore Tag

wolfHSM Support for Renesas RH850 F1KM

wolfHSM provides a hardware security module framework optimized for embedded systems, with continuous enhancements for the Renesas RH850 platform. Download wolfSSL → The RH850 F1KM port is designed to align closely with upstream wolfHSM and wolfSSL development while taking advantage of RH850 hardware cryptographic acceleration. Ongoing improvements focus on performance, reliability, and maintainability. Key technical […]

Read MoreMore Tag

wolfHSM Keystore Enhancements: Global Keys, Wrapped Keys, and Extended Usage Policies

wolfSSL is excited to announce major enhancements to wolfHSM’s keystore capabilities, introducing three powerful features that significantly expand key management flexibility and security: global keys, wrapped keys, and comprehensive key usage policies. Global Keys: Shared Security Across Clients The new global keys feature (WOLFHSM_CFG_GLOBAL_KEYS) enables cryptographic keys to be shared across multiple wolfHSM clients while […]

Read MoreMore Tag

wolfHSM Image Manager

wolfSSL is pleased to introduce the wolfHSM Image Manager, a new module for authenticated firmware verification in automotive and industrial systems. It provides a flexible, callback-based architecture for cryptographically verifying firmware before execution, complementing wolfBoot to form a secure chain of trust anchored in HSM hardware. Features Hardware-backed verification: All cryptographic operations use HSM-protected keys […]

Read MoreMore Tag

Posts navigation

1 2 3