Certicom Launches Suite B Hardware Security Power Bundle to Help Developers Leverage the Strong Security of Elliptic Curve Cryptography in Silicon
MISSISSAUGA, Ontario – January 17, 2007 – Certicom (TSX: CIC) today announced the Suite B Hardware Security Power Bundle to help developers add Suite B compliant algorithms to their hardware-based security with proven and standards-based implementations. A growing number of developers are using hardware-based security because it is stronger and faster than software-based mechanisms.
Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.
Elements of Suite B include:
Encryption: | Advanced Encryption Standard (AES) – FIPS 197 |
Digital Signature: | Elliptic Curve Digital Signature Algorithm (ECDSA) – FIPS 186-2 |
Key Exchange: | Elliptic Curve Diffie-Hellman (ECDH) or Elliptic Curve Menezes-Qu-Vanstone (ECMQV) – NIST Special Publication 800-56A |
Hashing: | Secure Hash Algorithm-2 (SHA-2)– FIPS 180-2 |
“Because of the government’s crypto modernization program, elliptic curve cryptography (ECC) is becoming the de facto standard for public key,” said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. “Our comprehensive Suite B Security Power Bundles help organizations quickly and cost-effectively implement the strongest security available. That’s why we are the best source of Suite B solutions in the industry.”
Suite B Hardware Security Power Bundle includes:
- Security Builder® PKCS #11™ and Security Builder® BSP™: adaptors that allow hardware (such as chips and HSMs) to work with Certicom security modules to ensure that applications are Suite B compliant
- Certicom® Security for Silicon Design Protection™: combines Certicom’s Production Control Core and KeyInject to securely add Suite B–based keys to applications, protect silicon IP, and provide metering and reporting functionality
- Configurable AES Core: supports all FIPS-approved modes of operation and Suite B key lengths of 128 and 256 bits
- Configurable SHA-2 Core: provides configurable hashing to match Suite B strengths: SHA-256, SHA-384 and SHA-512
- True Random Number Generator Core: provides a quality source of randomness for security function
The driving force behind ECC is the need for stronger security that can hold its strength today and for decades to come, and doesn’t compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards. ECC implementations are used to protect content, securely transmit data and enable digital signatures on documents and transactions. It offers more security per bit than RSA or other public-key algorithms.
Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. In 1997, Certicom developed the industry’s first toolkit to include ECC, which has since been adopted by more than 300 organizations.
The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth #1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.
For more information visit www.myeccworld.com.
About Certicom
Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
|
Related News
- Certicom Licenses Elliptic Curve Cryptography to IdentiPHI for Advanced Enterprise Security and Suite B Compliance
- Tumbleweed Licenses Certicom's Elliptic Curve Cryptography
- Ellipsys 2.0 Software Released by Elliptic - features Support for Elliptic Curve Cryptography & RSA Security
- Elliptic Semiconductor launches acceleration engine for elliptic curve cryptography (ECC)
- Xpeedic Launches High-Speed Digital Signal Integrity, Power Integrity Suite at Design Automation Conference
Breaking News
- Logic Design Solutions launches Gen4 NVMe host IP
- ULYSS1, Microcontroller (MCU) for Automotive market, designed by Cortus is available
- M31 is partnering with Taiwan Cooperative Bank to launch an Employee Stock Ownership Trust to strengthen talent retention
- Sondrel announces CEO transition to lead next phase of growth
- JEDEC Publishes LPDDR5 CAMM2 Connector Performance Standard
Most Popular
- Arm's power play will backfire
- Alphawave Semi Selected for AI Innovation Research Grant from UK Government's Advanced Research + Invention Agency
- Secure-IC obtains the first worldwide CAVP Certification of Post-Quantum Cryptography algorithms, tested by SERMA Safety & Security
- Weebit Nano continuing to make progress with potential customers and qualifying its technology Moving closer to finalisation of licensing agreements Q1 FY25 Quarterly Activities Report
- PUFsecurity Collaborate with Arm on PSA Certified RoT Component Level 3 Certification for its Crypto Coprocessor to Provide Robust Security Subsystem Essential for the AIoT era
E-mail This Article | Printer-Friendly Page |