SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Gold/Mining/Energy : Certicom Corporation (TSE:CIC, NASD:CERT)

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: Dexter Lives On1/8/2007 8:12:51 PM
  Read Replies (1) of 4913
 
Certicom Launches Suite B Web Security Power Bundle

Monday January 8, 8:00 pm ET

Modules provide industry's only complete Suite B web security solution for servers, clients, and communication protocols that leverage strength of elliptic curve cryptography
Suite B power bundles to be demonstrated at RSA Conference
MISSISSAUGA, ON, Jan. 8 /CNW/ - Certicom Corp. (TSX: CIC - News) today announced the Suite B Web Security Power Bundle to make it easy for IT managers to attain Suite B and FIPS compliance with security modules for web browsers, servers, and key communication protocols. As part of the U.S. government's crypto modernization program, the National Security Agency (NSA) recommended that communication devices and services use a specific set of cryptographic algorithms, known as Suite B, to protect classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.

Certicom's family of Suite B products and services is the industry's most comprehensive set of cryptographic modules, including proven and optimized implementations for all of the Suite B requirements. The Certicom Suite B Web Security Power Bundle provides the cryptographic engines that include the necessary algorithms as well as the tools to help developers implement protocols (e.g. IPSec, TLS, SSL) that support Suite B.

Elements of Suite B include:

Encryption: Advanced Encryption Standard (AES) - FIPS 197
Digital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA)
- FIPS 186-2
Key Exchange: Elliptic Curve Diffie-Hellman (ECDH) or Elliptic
Curve Menezes-Qu-Vanstone (ECMQV) - Draft NIST
Special Publication 800-56
Hashing: Secure Hash Algorithm-2 (SHA-2)- FIPS 180-2


"Elliptic curve cryptography (ECC) is the only public key used in Suite B, and therefore, is quickly replacing RSA algorithms as the de facto public key used in security mechanisms. In addition to governments in North America and in Europe adopting Suite B, a growing number of influential enterprises are implementing the algorithms and are encouraging widespread adoption," said Dr. Scott Vanstone, Certicom founder and EVP strategic technology. "The Certicom Suite B Power Bundles provide intuitive, flexible modules that provide easy implementation of security technology that is fully compliant with Suite B recommendations."

The driving force behind ECC is the need for stronger security that can hold its strength today and for decades to come. Also, because ECC offers more security per bit than other public-key algorithms, it doesn't compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards.

Certicom Suite B Web Security Power Bundle include:

- Security Builder(R) SSL(TM) mod-SSL plug-in for Apache: Certicom's
cryptographic plug-in allows Apache web server to become Suite B
compliant
- Certicom(R) Suite B CSP for Firefox(TM): Certicom's cryptographic
plug-in allows Firefox browsers to become Suite B compliant
- Security Builder(R) GSE(TM): Allows client- and server-side
applications to become FIPS 140-2 Validated
- Security Builder(R) IPSec(TM): A client-side module that enables
developers to build standards-based VPN applications
- Security Builder(R) SSL(TM): A module that enables developers to add
standards-based SSL and TLS protocols to client and server side
applications


Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. In 1997, Certicom developed the industry's first toolkit to include ECC, which has since been adopted by more than 300 organizations.

The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth No.1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.

About Certicom

Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales and marketing headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com.

Certicom, Certicom ECC Core, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder MCE, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information subject to change.

Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.

For further information

Lisa Courtney Lloyd, Jolita Communications, (613) 271-7512, lcourtneylloyd@jolita.ca

Source: Certicom Corp.

biz.yahoo.com

TM
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext