WolfSSL Inc. SP800-140C and Post-Quantum efforts update!
wolfSSL Blog
by Shizuka Ishikiriyama
22h ago
This is an update to previous post Everything wolfSSL is Preparing for Post-Quantum as of Spring 2024 and an extension to post wolfSSL Support for Post-Quantum. The National Institute of Standards and Technology (NIST) has recently updated its guidelines, enabling the certification of several post-quantum cryptographic algorithms through the Cryptographic Module Validation Program (CMVP). Notably ..read more
Visit website
SPAKE and wolfSSL in Kerberos 5
wolfSSL Blog
by Shizuka Ishikiriyama
2d ago
In today’s digital landscape, the need for robust authentication mechanisms has never been more crucial. Among the various methods available, SPAKE (Simple Password-Authenticated Key Exchange) stands out as an enhanced security solution for authenticating users. SPAKE represents a significant advancement over traditional password-based authentication, which often relies on static hashes. By leveraging a shared secret ..read more
Visit website
IPsec vs TLS: what are the differences
wolfSSL Blog
by Shizuka Ishikiriyama
3d ago
IPsec (Internet Protocol Security) and TLS (Transport Layer Security) are both used to protect data in transit between devices, and to secure network traffic over public or private internet. Both have cryptographic mechanisms for encryption, integrity checking, mutual authentication, replay protection, key exchange, etc. However, they operate at different network layers, and have different strengths ..read more
Visit website
When wolfSSL_UseKeyShare() is not Enough
wolfSSL Blog
by Shizuka Ishikiriyama
4d ago
Ladies and gentlemen, it’s story time!! Once upon a time, there was a network administrator that only wanted to use the strongest NIST-approved ECC encryption available within the TLS 1.3 protocol. They picked ECDHE over the secp521r1 curve. When they went to code their application, they wanted the best TLS library available so they naturally ..read more
Visit website
Deprecation Announcement: RC2
wolfSSL Blog
by Shizuka Ishikiriyama
6d ago
As part of our ongoing effort to maintain the highest level of security and performance, we are announcing the upcoming deprecation of RC2 from wolfCrypt. All of our products depend on wolfCrypt for their algorithm implementations so this could have consequences across our whole product line. What is RC2? RC2 is a symmetric-key block cipher ..read more
Visit website
Unlocking the Power of Secure Boot for AMD/Xilinx UltraScale+ MPSoC Systems
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
With the release of WolfBoot version v2.4.0, we have made significant improvements to our secure boot support for Xilinx UltraScale+ MPSoC systems. This major update brings several key enhancements that make it easier and more efficient to deploy wolfBoot on this target. UltraScale+ enhancements in wolfBoot v2.4.0 To see the complete list of improvements see ..read more
Visit website
The Risks of 3DES in FIPS Certificates
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
When it comes to securing data, cryptographic algorithms are the backbone of many systems. 3DES (Triple Data Encryption Standard) was once a FIPS (Federal Information Processing Standards) algorithm but is no longer supported by NIST as of 1 Jan 2024 (over 1 year ago!) Having 3DES in a FIPS module today could spell trouble on ..read more
Visit website
Deprecation Notice: liboqs Integration
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
Soon wolfSSL will no longer utilize the liboqs library. This change is intended to simplify the maintenance of the wolfSSL codebase by reducing the line count. The wolfSSL library already provides its own implementations of post-quantum algorithms, including Kyber and Dilithium. To enable these algorithms, users can simply configure wolfSSL with the following options: --enable-kyber ..read more
Visit website
Why Transition to DTLS 1.3 is Crucial for CNSA 2.0 Compliance and Cybersecurity
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
As we advance towards stronger cybersecurity measures, adhering to the latest security standards is crucial. Transitioning to DTLS 1.3 is becoming a necessity for anyone still using DTLS 1.2. Here are four compelling reasons why now is the perfect time to make the switch: Full Control over the Migration ProcessTypically, you control both the server ..read more
Visit website
Live Webinar: Post Quantum Cryptography Update
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
Secure Your Future: NIST PQC Standards and CNSA 2.0 Quantum computing is on the horizon, bringing new challenges to traditional cryptographic methods. To address these, NIST’s Post-Quantum Cryptography (PQC) standards and CNSA 2.0 guidelines provide essential tools for ensuring data protection in the quantum era. Join wolfSSL Senior Software Developer Anthony Hu in this exclusive ..read more
Visit website

Follow wolfSSL Blog on FeedSpot

Continue with Google
Continue with Apple
OR