September 8, 2003 - Burlington, MA USA, San Jose, USA, Bristol, UK, and Tokyo, Japan - NTRU, the information security experts, and SuperH, Inc., the leading supplier of multimedia RISC CPU cores, today announced that NTRU has joined SuperH's partner program. The SuperH partner program was established to create a world-class network of partner companies offering complimentary products and services to support SuperH licensees, their customers and the SuperH architecture. The SuperH partner program now has over 70 members. NTRU's experience in the embedded security market place gives SuperH users access to world-class secure communications technology for their SuperH based products.
"With NTRU's range of power efficient and small footprint security technology, SuperH licensees are able to make additional strides in their embedded designs that utilize the inherent low power and small code size characteristics of SuperH cores," said Rick Chapman, VP marketing and business development for SuperH. "Licensees designing SoC devices for the wireless networking and Smart Card / POS markets will benefit greatly with NTRU's state of the art security capabilities being available for the SuperH architecture."
"The SuperH architecture was designed from day one for the embedded market, their family of CPU cores featuring a 16-bit fixed length instruction set results in extremely compact code and fewer memory chips per system," said Ed King, NTRU's General Manger.
NTRU Cryptosystems, Inc. provides comprehensive security expertise to the embedded technology market. From system security analysis to highly optimized implementations on the most constrained platforms, NTRU provides practical security solutions that are tailored for specific application environments. NTRU's core competencies extend from development and evaluation of standards based security architectures and protocols, cryptosystem design and implementation of systems based on the NTRU algorithm suite and other major algorithms. NTRU provides state of the art services and solutions to a range of markets, trusted computing, wireless networking, carrier based wireless, smartcards and RFID/contactless identification.
Custom cryptographic libraries optimized for specific target applications and protocols. NTRU works with the customer to design appropriate security services and algorithms for their application. In addition to the NTRU algorithm suite, NTRU has strong expertise with a range of algorithms including RSA, DSA, Diffie-Hellman, AES, Triple-DES, ARCFOUR, SHA, MD5, HMAC and X9.82 PRNG. Key attributes of the libraries we implement include:
- Optimized for application specific parameters: performance, power, footprint, memory utilization
- Efficient: Implemented completely in assembly and callable by both C and assembly routines
- Standards based: Rigorously tested against industry and/or government test vectors
NTRU's toolkit product family, Neo, delivers the speed, size, and flexibility that application developers require to provide secure applications. As a result of its unique performance advantages the NTRU product family enables strong, high-performance, low-footprint security to constrained environments. All NTRU products are optimized for size, speed, and security and are available in software (C, Java), embedded software (assembly or C), or hardware (VHDL) implementations.
NTRU's Professional Services team is comprised of experienced security analysts, engineers and cryptographers. By understanding how a product or system is used in the field we can help you assess the risks that your customers will encounter and collaboratively design appropriate security solutions. Our team has extensive experience in analyzing and implementing solutions, both large and small, in a wide range of application areas. NTRU's key core competencies include:
Trusted Computing: NTRU's security analysts have state-of-the-art knowledge of Microsoft Next Generation Secure Computing Base (NGSCB) and Trusted Computing Group (TCG) concepts, systems and implementations. We have worked with founding members of the TCG to review and critique specifications, and can provide critical expertise to both software and hardware vendors developing TCG and NGSCB compliant products.
Secure Wireless Networking: NTRU's experts have led the development of several significant wireless networking solutions including IEEE 802.15.3 Ad Hoc Wireless Personal Area Networks, IEEE 802.15.4 WPAN
Protocol Analysis and Design: NTRU security professionals can analyze a system holistically, ensure threats are well understood, derive security requirements and develop protocols appropriate to the unique constraints of customer environments.
Embedded Security Analysis and Design: NTRU's technical staff has deep expertise in embedded security analysis, design and implementation. Its research team consists of a group of world-renowned mathematicians and cryptographers.
NTRU Cryptosystems, Inc. provides comprehensive security expertise to the embedded technology market. From system security analysis to highly optimized implementations on the most constrained platforms, NTRU provides practical security solutions that are tailored for specific application environments. NTRU's core competencies extend from development and evaluation of standards based security architectures and protocols, cryptosystem design and implementation of security solutions based on the NTRU algorithm suite and other major algorithms. NTRU provides state of the art services and solutions to a range of markets, including trusted computing, wireless networking, authentication products and general embedded security applications. Headquartered in Burlington, Mass., NTRU's investors include Texas Instruments, Sony Corporation, Macrovision, Lehman Brothers Venture Capital, Investor AB, Granite Ventures, Greylock and 3i. For more information, please visit www.ntru.com.