Certicom Launches Suite B Hardware Security Power Bundle to Help Developers Leverage the Strong Security of Elliptic Curve Cryptography in Silicon
[ Back ]   [ More News ]   [ Home ]
Certicom Launches Suite B Hardware Security Power Bundle to Help Developers Leverage the Strong Security of Elliptic Curve Cryptography in Silicon

Suite B power bundles to be demonstrated at RSA Conference

MISSISSAUGA, ON, Jan. 16 /PRNewswire-FirstCall/ - Certicom today announced the Suite B Hardware Security Power Bundle to help developers add Suite B compliant algorithms to their hardware-based security with proven and standards-based implementations. A growing number of developers are using hardware-based security because it is stronger and faster than software-based mechanisms.

Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.

    Elements of Suite B include:
    Encryption:           Advanced Encryption Standard (AES) - FIPS 197
    Digital Signature:    Elliptic Curve Digital Signature Algorithm (ECDSA)
                          - FIPS 186-2
    Key Exchange:         Elliptic Curve Diffie-Hellman (ECDH) or Elliptic
                          Curve Menezes-Qu-Vanstone (ECMQV) - NIST Special
                          Publication 800-56A
    Hashing:              Secure Hash Algorithm-2 (SHA-2)- FIPS 180-2

"Because of the government's crypto modernization program, elliptic curve cryptography (ECC) is becoming the de facto standard for public key," said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. "Our comprehensive Suite B Security Power Bundles help organizations quickly and cost-effectively implement the strongest security available. That's why we are the best source of Suite B solutions in the industry."

    Suite B Hardware Security Power Bundle includes:
    -   Security Builder(R) PKCS #11(TM) and Security Builder(R) BSP(TM):
        adaptors that allow hardware (such as chips and HSMs) to work with
        Certicom security modules to ensure that applications are Suite B
        compliant
    -   Certicom(R) Security for Silicon Design Protection(TM): combines
        Certicom's Production Control Core and KeyInject to securely add
        Suite B-based keys to applications, protect silicon IP, and provide
        metering and reporting functionality
    -   Configurable AES Core: supports all FIPS-approved modes of operation
        and Suite B key lengths of 128 and 256 bits
    -   Configurable SHA-2 Core: provides configurable hashing to match Suite
        B strengths: SHA-256, SHA-384 and SHA-512
    -   True Random Number Generator Core: provides a quality source of
        randomness for security function

The driving force behind ECC is the need for stronger security that can hold its strength today and for decades to come, and doesn't compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards. ECC implementations are used to protect content, securely transmit data and enable digital signatures on documents and transactions. It offers more security per bit than RSA or other public-key algorithms.

Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. In 1997, Certicom developed the industry's first toolkit to include ECC, which has since been adopted by more than 300 organizations.

The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth #1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.

About Certicom

Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales and marketing headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com

Certicom, Certicom ECC Core, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder MCE, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information subject to change.

Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.