Press Release Summary:
Suite B Professional Services Team is available to help organizations meet Suite B standards without having to become cryptographic experts themselves. Services are provided by security software and hardware engineers as well as mathematicians with experience in assessing requirements and integrating cryptographic-based security functions into applications, devices, and microprocessors.
Original Press Release:
Certicom Launches Suite B Professional Services
MISSISSAUGA, ON, Jan. 23 -- Certicom (TSX: CIC) today announced the Suite B Professional Services Team is available to help organizations meet Suite B standards without having to become cryptographic experts themselves thereby saving time and money. The Certicom team includes security software and hardware engineers as well as mathematicians who have vast experience in assessing requirements and integrating cryptographic-based security functions into applications, devices and microprocessors.
As part of the U.S. government's crypto modernization program, the National Security Agency (NSA) recommended that communication devices and services use a specific set of cryptographic algorithms, known as Suite B, to protect classified and unclassified communications. The private sector is also beginning to implement the Suite B algorithms in products and services as Suite B has redefined what is considered industry best practice for cryptographic implementations.
Elements of Suite B include:
Encryption: Advanced Encryption Standard (AES) - FIPS 197
Digital Signature: Elliptic Curve Digital Signature Algorithm (ECDSA) - FIPS 186-2
Key Exchange: Elliptic Curve Diffie-Hellman (ECDH) or Elliptic Curve Menezes-Qu-Vanstone (ECMQV) - NIST Special Publication 800-56A
Hashing: Secure Hash Algorithm-2 (SHA-2)- FIPS 180-2
"Suite B is experiencing widespread adoption. Globally, governments and a growing number of influential enterprises are implementing the recommended algorithms to make sure the security they use is future-proof. From a compatibility as well as a security perspective companies need to consider upgrading their security. Our professional services team has the experience and expertise to help organizations implement Suite B quickly and cost effectively," said Dr. Scott Vanstone, Certicom founder and EVP strategic technology.
The driving force behind ECC, which is the only public key named in Suite B, is the need for stronger security that can hold its strength today and for decades to come. Also, because ECC offers more security per bit than other public-key algorithms, it doesn't compromise performance, a feature especially important in constrained environments such as mobile devices and chips. For years, organizations such as ANSI, IETF and NIST have been adding ECC to standards.
Certicom is known as the ECC pioneer and expert, having researched and developed ECC-based implementations and security for the past 20 years. Certicom's family of Suite B products and services is the industry's most comprehensive set of cryptographic modules, including proven and optimized implementations for all of the Suite B requirements.
The Certicom Suite B Power Bundles are available immediately and will be demonstrated in the Certicom booth # 1236 at the RSA Conference, Moscone Center, San Francisco, February 5-9, 2007.
Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales and marketing headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
Certicom, Certicom ECC Core, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder MCE, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. Information subject to change.
CONTACT: Lisa Courtney Lloyd, Jolita Communications, (613) 271-7512, firstname.lastname@example.org