rustls-wolfcrypt-provider integrates the wolfCrypt cryptographic library as a backend for Rustls, allowing developers to use wolfCrypt’s secure cryptographic functions with Rustls’ modern TLS stack. Currently in alpha, this library offers flexibility for those needing an alternative crypto provider, especially for projects requiring FIPS 140-3 readiness. Other reasons to consider wolfCrypt as your Rustls provider include […]
Read MoreMore TagCategory: wolfSSL/ wolfCrypt
Strengthening RSA default minimum to 2048 bits
wolfSSL helps make the internet secure. Part of this task is continually updating our default settings to keep up with adversarial advancements. A recent article detailed the use of default RSA key sizes by an IoT manufacturer, which resulted in a 512 bit key being used for authentication. “The factoring required $70 in cloud computing […]
Read MoreMore TagExpressVPN’s Benchmark Results with wolfSSL
wolfSSL’s trusted partner, ExpressVPN, recently announced impressive cryptographic benchmark results comparing unaccelerated and hardware-accelerated performance with wolfSSL. Check out ExpressVPN’s benchmarks and download Lightway Core, ExpressVPN’s modern VPN protocol, on GitHub. If you have questions about any of the above, please contact us at facts@wolfSSL.com or +1 425 245 8247. Download wolfSSL Now
Read MoreMore TagAzure Removing TLS 1.0 & TLS 1.1
Are you prepared for the upcoming security enhancements in Azure, which will remove support for TLS 1.0 and TLS 1.1? By the end of October, Azure will no longer accept connections using TLS 1.0 and TLS 1.1 (Azure announcement). This is great news! The older TLS protocols are less secure compared to the newer TLS […]
Read MoreMore TagFIPS 140-3 and CNSA 2.0 with a Single TLS Connection
Can you believe it? With wolfSSL you can now have a TLS 1.3 connection that is compliant with both FIPS 140-3 and the CNSA 2.0! Want to know how? For key establishment, we can use the new ML-KEM-1024 (also known as Kyber-1024 which is at security level 5 as defined by NIST) hybridized with ECDH […]
Read MoreMore TagRapid prototyping with Arduino and wolfSSL
Do you have an idea for a project but want a quick prototype without the hassle of a custom board? We’re happy to announce that our latest wolfSSL v5.7.2 library is now available in the Arduino Registry for rapid prototypes. Just type “wolfSSL” in the Library Manager of the Arduino IDE. If nothing happens right […]
Read MoreMore TagPart 5: 5 Real-World Use Cases and Troubleshooting
Are you interested in FIPS 140-3 RISC-V Certification? Check out our RISC-V Announcement: wolfSSL Embraces RISC-V; FIPS 140-3 Certifications Now Available Here are some places where wolfSSL can be found: Hex Five And wolfSSL Announce The First Secure IoT Stack For RISC-VHex Five Security, Inc., in collaboration with wolfSSL, has developed the first secure IoT […]
Read MoreMore TagPart 4: Customization and Advanced wolfSSL Features on RISC-V
Are you interested in FIPS 140-3 RISC-V Certification? Check out our RISC-V Announcement: wolfSSL Embraces RISC-V; FIPS 140-3 Certifications Now Available The RISC-V architecture, known for its open-source and customizable nature, has seen a growing adoption in various embedded systems and IoT applications. As developers continue to push the boundaries of what RISC-V can achieve, […]
Read MoreMore TagPart 3: Sample Application: Integrating wolfSSL with a RISC-V
Are you interested in FIPS 140-3 RISC-V Certification? Check out our RISC-V Announcement: wolfSSL Embraces RISC-V; FIPS 140-3 Certifications Now Available The important thing to know: there are no special requirements for wolfSSL to run on your RISC-V device. There are no external dependencies. We can run a TLS stack in the smallest memory footprint. […]
Read MoreMore TagPart 2: Installing and Configuring wolfSSL on RISC-V
There are no special requirements or prerequisites for using wolfSSL in a RISC-V project. As noted in our prior blog, wolfSSL has been developed in a Clean Room environment and has no external dependencies. Unlike other options, wolfSSL is still maintained with oversight from the original developers. If your current project compiles, you can add […]
Read MoreMore Tag
