WolfSSH v1.4.17 Improvements and Fixes
wolfSSL Blog
by Shizuka Ishikiriyama
1d ago
wolfSSH has several useful features that were introduced in this most recent release. We have made wolfSSH builds for various systems better and easier. This includes changes to configuration scripts and modifying code to work with various compiler quirks. We’ve made building wolfSSH for Nucleus, QNX, Windows, and ESP32 builds better. And we’ve fixed an issue working with the Zephyr file system involving redundant file mode bits. We’ve improved testing of wolfSSH. There are new scripts to test details of the wolfSSHd server. Also, the Zephyr SFTP test uses a different file for the transfer tes ..read more
Visit website
Join wolfSSL for Cybersecurity Innovations at AMD AC Summits in North America
wolfSSL Blog
by Shizuka Ishikiriyama
2d ago
We are thrilled to announce that wolfSSL will be participating in all the upcoming AMD AC Summits across North America, kicking off in Boston, MA on May 7th and concluding in Dallas, TX on May 21st. As a leading provider of lightweight, portable, embedded SSL/ TLS software, we’re excited to be a part of AMD AC Summit to explore the latest advancements and opportunities in the industry. Event Details Boston, MA | May 7th Washington D.C., MD | May 9th Los Angeles, CA | May 14th San Jose, CA | May 16th Dallas, TX | May 21st Why wolfSSL? wolfSSL brings cutting-edge solutions to the table, includ ..read more
Visit website
Join Our Webinar: Everything You Need to Know about FIPS 140-3 in 2024
wolfSSL Blog
by Shizuka Ishikiriyama
2d ago
Join us on May 9th at 10am PT for an enlightening webinar hosted by Kaleb Himes, Senior Software Engineer at wolfSSL, as we explore the critical aspects of FIPS 140-3. This webinar will deep dive into the fundamentals, benefits of wolfCrypt FIPS, and the essentials of FIPS certification. Register Today: Everything You Need to Know about FIPS 140-3 During this detailed session, you will gain insights into: The benefits of FIPS 140-3 for securing cryptographic modules Detailed FIPS certification and compliance procedures Understanding the significance of an Operational Environment (OE) Explorin ..read more
Visit website
PQC support for the Zephyr port
wolfSSL Blog
by Shizuka Ishikiriyama
5d ago
PQC support for the Zephyr port was introduced in the last wolfSSL release using liboqs. This involved adding necessary files to the CMakeLists.txt for the Zephyr module. Zephyr is an open-source real-time operating system (RTOS) designed for resource-constrained devices and embedded systems. It is maintained by the Linux Foundation and supported by a vibrant community of developers and contributors. PR #7026 (https://github.com/wolfSSL/wolfssl/pull/7026) also addressed proper random number generation within liboqs by using the wolfSSL interface. Previously, liboqs random data acquisition reli ..read more
Visit website
WolfSSL on Microblaze
wolfSSL Blog
by Shizuka Ishikiriyama
6d ago
MicroBlaze, developed by Xilinx, is a soft processor core optimized for Xilinx FPGAs. It offers flexibility and scalability, making it suitable for a wide range of applications, including embedded systems and IoT devices. Integrating wolfSSL’s AES-GCM with MicroBlaze is possible and has been done running on a soft CPU on MicroBlaze. In the latest wolfSSL release this integration saw some additional enhancements. When used on a MicroBlaze, wolfSSL’s AES-GCM enhances the security capabilities of FPGA-based systems, enabling developers to implement secure communication protocols and data encrypti ..read more
Visit website
RSA-PSS with CRL’s
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
Did you know wolfSSL has integration of RSA-PSS signatures with Certificate Revocation List (CRL) support? RSA-PSS: Enhancing Security Layers RSA-PSS, or Probabilistic Signature Scheme, represents a modern approach to digital signatures. Unlike traditional RSA signatures, RSA-PSS offers improved security properties, making it more resilient against various cryptographic attacks. By adopting RSA-PSS, wolfSSL users benefit from heightened security, enhancing the integrity of cryptographic operations. Certificate Revocation List (CRL): Managing Certificate Integrity In the realm of certificate ma ..read more
Visit website
Removal of user RSA
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
In the last release of wolfSSL there was some house cleaning done on older RSA implementations. The user RSA layer was removed along with the hooks used for tying in IPP. When those were first introduced we had yet to implement SP (single precision) versions of RSA. Fast forward to today, and there is a faster implementation of RSA in wolfSSL itself. In IPP v0.9 it was able to do 990.09 RSA 2048 bit sign operations per second and in wolfSSL 5.7.0 it was able to run 1,015.23 operations per second. Verify operations took around the same time with both libraries now at 35,714 operations per secon ..read more
Visit website
Live Webinar: Migrating from Mocana to wolfSSL
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
Join our upcoming webinar, ‘Migrating from Mocana to wolfSSL,’ on May 2nd at 10 am PT hosted by wolfSSL Senior Software Engineer, Eric Blankenhorn. He will unveil the advantages of switching to wolfSSL, offering a superior alternative to Mocana with better support and a smoother workflow. Save the date: May 2nd | 10 am PT During this session, Eric will provide in-depth insights into what makes wolfSSL different from Mocana and address the gaps you might be experiencing while using Mocana. Discover a smooth transition from Mocana to wolfSSL, along with best practices for ensuring security conti ..read more
Visit website
How to unload intermediate certificates with wolfSSL?
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
Recently, a notable modification was introduced in wolfSSL, a prominent provider of security solutions. Pull request #7245 (https://github.com/wolfSSL/wolfssl/pull/7245) focuses on optimizing memory management by introducing a function to unload intermediate CA certificates and free up memory. Let’s explore the significance of this code change and its potential impact on enhancing efficiency and resource utilization within cryptographic applications. Specifically, the code change addresses the need to efficiently handle intermediate Certificate Authority (CA) certificates. These certificates ..read more
Visit website
ML-KEM and ML-DSA at the CAVP
wolfSSL Blog
by Shizuka Ishikiriyama
1w ago
The CAVP (Cryptographic Algorithm Validation Program) now has testing available for ML-KEM (Kyber) and ML-DSA (Dilithium). Initial Draft standards for these algorithms have been released as FIPS-203 and FIPS-204 respectively. You can find the various .json test cases here: https://github.com/usnistgov/ACVP-Server/tree/master/gen-val/json-files/ML-DSA-keyGen-FIPS204 https://github.com/usnistgov/ACVP-Server/tree/master/gen-val/json-files/ML-DSA-sigGen-FIPS204 https://github.com/usnistgov/ACVP-Server/tree/master/gen-val/json-files/ML-DSA-sigVer-FIPS204 https://github.com/usnistgov/ACVP-Server/tr ..read more
Visit website

Follow wolfSSL Blog on FeedSpot

Continue with Google
Continue with Apple
OR