Profile cover photo
Profile photo
wolfSSL
14 followers -
Embedded SSL for Applications, Devices, and the Cloud
Embedded SSL for Applications, Devices, and the Cloud

14 followers
About
wolfSSL's posts

Post has attachment
wolfSSL at FOSDEM 2016 - In a matter of weeks, hundreds of Open Source developers will gather in Brussels, Belgium for FOSDEM 2016. FOSDEM is a two day event organized by volunteers to promote the widespread use of Open Source software, and is considered by many to be the best open source conference in Europe [1]. wolfSSL will be attending FOSDEM this year, will have a stand in the “H” building, and will be giving a talk on Testing Cryptography in the security devroom. The wolfSSL stand wil...

Post has attachment
wolfSSL Safe from SLOTH Attack - A new year, another attack on TLS.  Karthikeyan Bhargavan and Gaetan Leurent of INRIA recently announced the new attack.  TLS 1.2 allows negotiation of the hashing algorithm used for signatures, typically to “upgrade” the hash to a higher security level.  Before TLS 1.2 a combination of MD5 and SHA1 were used for signatures. TLS 1.2 allows SHA1, SHA-256, SHA-384, SHA-512, but also MD5 to be chosen for signatures.  Fortunately for users of the wolfSSL embedde...

Post has attachment
CES Big Story #3: Internet of Things Hyper Mania Hits Hard Reality - Security

Post has attachment
IoT Security: Start with the Fundamentals - Securing connected devices, including the IoT, is very important to us at wolfSSL. Larry Stefonic, CEO and Co-Founder of wolfSSL, recently published a guest post on the Xively blog that talks about the fundamentals of device security. This post includes commentary on securing the connection, device authentication, secure firmware updates, and securing the data on the device. To read the article in full, visit the link below: https://blog.xively.co...

Post has attachment
wolfSSL Roadmap for 2016 - Curious about new features and additions to wolfSSL technologies for the coming year? Some items on our current roadmap include: - Early TLS 1.3 adoption - Non-blocking Crypto support - DTLS robustness improvements - Curve25519 / Ed25519 integration at the TLS level - Increased IoT platforms - More resource reduction options In terms of new environments we’ll have: - More FIPS platforms - Additional hardware acceleration options - Easier integration with event pro...

Post has attachment
wolfSSL Partners with Renesas to Deliver SSL/TLS Based Secure Communications

Post has attachment
When to use Pre Shared Key (PSK) Cipher Suites - PSK cipher suites are a superb choice in low resource environments where both ends of the connection can be controlled. With PSK, each side of the connection has an already agreed upon key to use rather than agreeing on one during the TLS handshake. This reduces resource consumption for each session using PSK. For example, on one of wolfSSL’s test machines the cipher suite DHE-PSK-AES128-CBC-SHA256 has an average connection time of 3.498 mill...

Post has attachment
wolfSSL JNI 1.3.0 Released - Version 1.3.0 of wolfSSL JNI is now available for download. wolfSSL JNI provides Java applications with a convenient Java API to the widely-used wolfSSL embedded SSL/TLS library, including support for TLS 1.2 and DTLS 1.2. Release 1.3.0 has bug fixes and new features including: - Updated support to wolfSSL 3.7.0 - Added finalizers for WolfSSLContext and WolfSSLSession classes - Fix for SSLv3 now disabled by default in wolfSSL proper - SSLv3 now marked as @Deprec...

Post has attachment
User Crypto Modules - wolfSSL has a new feature to allow for users to plug in their own crypto for RSA if they so choose. This is a great feature for students looking to test their own RSA operations in a SSL/TLS connection or for those wanting to see if they can speed up operations in the IoT realm and on embedded devices. This option can be used with the build flag “--with-user-crypto”. An example of building a module can be found in the directory “wolfssl_root/wolfcrypt/user-crypto/” and...

Post has attachment
wolfMQTT v0.3 and MQTT Secure Firmware Update Example - The wolfMQTT v0.3 release adds a new example for secure firmware update. This example uses the wolfSSL embedded SSL/TLS library to hash/sign the binary image and send it over MQTT. The example has two applications. One is called fwpush, which hashes, signs and publishes the firmware image over TLS to an MQTT broker. The second is called fwclient, which subscribes to the example firmware update topic, receives the firmware image and val...
Wait while more posts are being loaded