Certicom Launches Suite B Hardware Security Power Bundle to Help Developers Leverage the Strong Security of Elliptic Curve Cryptography in Silicon
MISSISSAUGA, Ontario – January 17, 2007 – Certicom (TSX: CIC) today announced the Suite B Hardware Security Power Bundle to help developers add Suite B compliant algorithms to their hardware-based security with proven and standards-based implementations. A growing number of developers are using hardware-based security because it is stronger and faster than software-based mechanisms.
Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.
Elements of Suite B include:
Encryption: | Advanced Encryption Standard (AES) – FIPS 197 |
Digital Signature: | Elliptic Curve Digital Signature Algorithm (ECDSA) – FIPS 186-2 |
Key Exchange: | Elliptic Curve Diffie-Hellman (ECDH) or Elliptic Curve Menezes-Qu-Vanstone (ECMQV) – NIST Special Publication 800-56A |
Hashing: | Secure Hash Algorithm-2 (SHA-2)– FIPS 180-2 |
“Because of the government’s crypto modernization program, elliptic curve cryptography (ECC) is becoming the de facto standard for public key,” said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. “Our comprehensive Suite B Security Power Bundles help organizations quickly and cost-effectively implement the strongest security available. That’s why we are the best source of Suite B solutions in the industry.”
Suite B Hardware Security Power Bundle includes:
- Security Builder® PKCS #11™ and Security Builder® BSP™: adaptors that allow hardware (such as chips and HSMs) to work with Certicom security modules to ensure that applications are Suite B compliant
- Certicom® Security for Silicon Design Protection™: combines Certicom’s Production Control Core and KeyInject to securely add Suite B–based keys to applications, protect silicon IP, and provide metering and reporting functionality
- Configurable AES Core: supports all FIPS-approved modes of operation and Suite B key lengths of 128 and 256 bits
- Configurable SHA-2 Core: provides configurable hashing to match Suite B strengths: SHA-256, SHA-384 and SHA-512
- True Random Number Generator Core: provides a quality source of randomness for security function
The driving force behind ECC is the need for stronger security that can hold its strength today and for decades to come, and doesn’t compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards. ECC implementations are used to protect content, securely transmit data and enable digital signatures on documents and transactions. It offers more security per bit than RSA or other public-key algorithms.
Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. In 1997, Certicom developed the industry’s first toolkit to include ECC, which has since been adopted by more than 300 organizations.
The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth #1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.
For more information visit www.myeccworld.com.
About Certicom
Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
Related Semiconductor IP
- Root of Trust (RoT)
- Fixed Point Doppler Channel IP core
- Multi-protocol wireless plaform integrating Bluetooth Dual Mode, IEEE 802.15.4 (for Thread, Zigbee and Matter)
- Polyphase Video Scaler
- Compact, low-power, 8bit ADC on GF 22nm FDX
Related News
- Certicom Licenses Elliptic Curve Cryptography to IdentiPHI for Advanced Enterprise Security and Suite B Compliance
- Tumbleweed Licenses Certicom's Elliptic Curve Cryptography
- Ellipsys 2.0 Software Released by Elliptic - features Support for Elliptic Curve Cryptography & RSA Security
- Athena Announces Fastest Elliptic Curve Cryptography Accelerator Core
Latest News
- BrainChip Provides Low-Power Neuromorphic Processing for Quantum Ventura’s Cyberthreat Intelligence Tool
- Ultra Accelerator Link Consortium (UALink) Welcomes Alibaba, Apple and Synopsys to Board of Directors
- CAST to Enter the Post-Quantum Cryptography Era with New KiviPQC-KEM IP Core
- InPsytech Announces Finalization of UCIe IP Design, Driving Breakthroughs in High-Speed Transmission Technology
- Arm Announces Appointment of Eric Hayes as Executive Vice President, Operations