NVM OTP in UMC (180nm, 153nm, 110nm, 90nm, 80nm, 55nm, 40nm, 28nm, 22nm)
Certicom Launches Suite B Hardware Security Power Bundle to Help Developers Leverage the Strong Security of Elliptic Curve Cryptography in Silicon
MISSISSAUGA, Ontario – January 17, 2007 – Certicom (TSX: CIC) today announced the Suite B Hardware Security Power Bundle to help developers add Suite B compliant algorithms to their hardware-based security with proven and standards-based implementations. A growing number of developers are using hardware-based security because it is stronger and faster than software-based mechanisms.
Suite B is the set of cryptographic algorithms recommended by the National Security Agency (NSA) to secure classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.
Elements of Suite B include:
Encryption: | Advanced Encryption Standard (AES) – FIPS 197 |
Digital Signature: | Elliptic Curve Digital Signature Algorithm (ECDSA) – FIPS 186-2 |
Key Exchange: | Elliptic Curve Diffie-Hellman (ECDH) or Elliptic Curve Menezes-Qu-Vanstone (ECMQV) – NIST Special Publication 800-56A |
Hashing: | Secure Hash Algorithm-2 (SHA-2)– FIPS 180-2 |
“Because of the government’s crypto modernization program, elliptic curve cryptography (ECC) is becoming the de facto standard for public key,” said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. “Our comprehensive Suite B Security Power Bundles help organizations quickly and cost-effectively implement the strongest security available. That’s why we are the best source of Suite B solutions in the industry.”
Suite B Hardware Security Power Bundle includes:
- Security Builder® PKCS #11™ and Security Builder® BSP™: adaptors that allow hardware (such as chips and HSMs) to work with Certicom security modules to ensure that applications are Suite B compliant
- Certicom® Security for Silicon Design Protection™: combines Certicom’s Production Control Core and KeyInject to securely add Suite B–based keys to applications, protect silicon IP, and provide metering and reporting functionality
- Configurable AES Core: supports all FIPS-approved modes of operation and Suite B key lengths of 128 and 256 bits
- Configurable SHA-2 Core: provides configurable hashing to match Suite B strengths: SHA-256, SHA-384 and SHA-512
- True Random Number Generator Core: provides a quality source of randomness for security function
The driving force behind ECC is the need for stronger security that can hold its strength today and for decades to come, and doesn’t compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards. ECC implementations are used to protect content, securely transmit data and enable digital signatures on documents and transactions. It offers more security per bit than RSA or other public-key algorithms.
Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. In 1997, Certicom developed the industry’s first toolkit to include ECC, which has since been adopted by more than 300 organizations.
The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth #1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.
For more information visit www.myeccworld.com.
About Certicom
Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
|
Related News
- Certicom Licenses Elliptic Curve Cryptography to IdentiPHI for Advanced Enterprise Security and Suite B Compliance
- Tumbleweed Licenses Certicom's Elliptic Curve Cryptography
- Ellipsys 2.0 Software Released by Elliptic - features Support for Elliptic Curve Cryptography & RSA Security
- Elliptic Semiconductor launches acceleration engine for elliptic curve cryptography (ECC)
- Xpeedic Launches High-Speed Digital Signal Integrity, Power Integrity Suite at Design Automation Conference
Breaking News
- Arteris Joins Intel Foundry Accelerator Ecosystem Alliance Program to Support Advanced Semiconductor Designs
- SkyeChip Joins Intel Foundry Accelerator IP Alliance
- Siemens and Intel Foundry advance their collaboration to enable cutting-edge integrated circuits and advanced packaging solutions for 2D and 3D IC
- Cadence Expands Design IP Portfolio Optimized for Intel 18A and Intel 18A-P Technologies, Advancing AI, HPC and Mobility Applications
- Synopsys and Intel Foundry Propel Angstrom-Scale Chip Designs on Intel 18A and Intel 18A-P Technologies
Most Popular
- QuickLogic Delivers eFPGA Hard IP for Intel 18A Based Test Chip
- Siemens collaborates with TSMC to drive further innovation in semiconductor design and integration
- Aion Silicon Joins Intel Foundry Accelerator Design Services Alliance to Deliver Next-Generation Custom SoCs at Scale
- TSMC Unveils Next-Generation A14 Process at North America Technology Symposium
- BOS Semiconductors to Partner with Intel to Accelerate Automotive AI Innovation
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |