Edmonds, WA 98020 [email protected]
+1 (425) 245-8247
wolfSSL Inc. announced that wolfSSL, a security library for embedded systems, supports post-quantum cryptography. Users who utilize the wolfSSL library can communicate using post-quantum cryptography on Transport Layer Security (TLS) without having to make changes to their applications.
Need client-side data transfer via popular Internet protocols like HTTP and HTTPS, but in an embedded-scale package that will work with 32-bit processor architectures and use less than100 KB of memory? You’ve come to the right place.
The Trusted Computing Group’s (TCG’s) Trusted Platform Module 2.0 (TPM 2.0) specification provides the foundation for building hardware-based cryptographic processing functions into modern-day electronic systems. But where do you go from there?
Intrusion detection and prevention systems (IDPS) can be described as advanced firewalls that help guard against both internal and external network-borne threats. They are usually deployed in the context of an entire network. But what about detecting and preventing an intrusion on an individual device, like a connected embedded or IoT system?
Are your systems secured to FIPS 140-2? Do you want the good news or the bad news first?
The bad news is that FIPS 140-2 has been superseded. The good news is that wolfSSL’s wolfCrypt crypto library has been validated to FIPS 140-3.
What’s the most secure, reliable type of software you can think of? The software running on aircraft is certainly at the top of the list.
One of the biggest advantages of IoT devices is that they can be updated remotely post-deployment. Of course, those update mechanisms have to be secure.