Certicom Security Architecture for Government provides integrated suite of security toolkits that ensure critical FIPS 140-2 and ECC compliance
MISSISSAUGA, Ontario – (December 6, 2004)– Certicom Corp. (TSX: CIC), the authority for strong, efficient cryptography, has extended its Certicom Security Architecture™, enabling developers to embed a FIPS 140-2-validated cryptographic module into their products and be eligible for sale into the federal government market. The Certicom Security Architecture also provides developers with an efficient way to enhance new and existing applications with elliptic curve cryptography (ECC) and meet the field-of-use guidelines set out by the National Security Agency (NSA) to protect mission-critical national security information.
The adoption of ECC within the U.S. federal government is proceeding rapidly, and Certicom is taking a leadership role in enabling agencies and government contractors to integrate the strongest security technology into their products. The comprehensive Certicom Security Architecture provides a bridge between legacy crypto systems and ECC, and gives developers the flexibility to standardize code among different security environments and platforms - maximizing code re-use and portability. This flexibility also means developers will not need to redesign their solutions to meet future government crypto requirements.
"Hardware and software developers are increasingly realizing that compliance with regulatory requirements for security is a pressing concern," said Dr. Jerry Krasner, vice president and chief analyst at Embedded Market Forecasters (www.embeddedforecast.com), the premier market intelligence and advisory firm in the embedded technology industry. "A cost-effective approach is to use a tool that ensures compliance with FIPS 140-2 requirements and eliminates the potentially costly step of third-party FIPS validation of a device or application."
Strong security is a key requirement across all networked applications and devices. The Certicom Security Architecture allows developers who may have little security expertise to add FIPS 140-2 validated security to their solutions while avoiding the time and expense of the FIPS 140-2 validation process. A common application programming interface (API) unifies Certicom's proven developer toolkits to create a plug-and-play security architecture that includes higher level protocol functionality that can operate in FIPS mode, such as SSL and PKI.
"Certicom Security Architecture for Government makes it easy for OEMs, ISVs and integrators to sell products into the government sector that meet strict government security requirements, including FIPS 140-2 and ECC," said Roy Pereira, vice-president, marketing and product management at Certicom. "The National Security Agency is committed to making elliptic curve cryptography the most widely used public-key cryptosystem for securing U.S. government information. Certicom is committed to providing the technology and tools to make that possible."
The Security Builder developer toolkits integrated into the Certicom Security Architecture for Government include:
• Security Builder® GSE™, a FIPS 140-2-validated cryptographic toolkit;
• Security Builder® NSE™, a cryptographic toolkit for national security information;
• Security Builder® Crypto™, a cross-platform cryptographic toolkit;
• Security Builder® PKI™, a digital certificate management toolkit;
• Security Builder® SSL™, a complete Secure Sockets Layer toolkit; and
• Security Builder® IPSec™, a client-side virtual private network toolkit.
Certicom Security Architecture for Government is available immediately, except for Security Builder NSE which is available in Q1 2005. For more information, visit http://www.certicom.com/gov.
About Certicom
Certicom Corp. (TSX:CIC) is the authority for strong, efficient cryptography required by software vendors and device manufacturers to embed security in their products. Adopted by the U.S. government’s National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography (ECC) provide the most security per bit of any known public key scheme, making it ideal for constrained environments. Certicom products and services are currently licensed to more than 300 customers including Motorola, Oracle, Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985, Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa, ON; Reston, VA; San Mateo, CA; and London, England. Visit www.certicom.com.
For further information, please contact:
For Certicom | ||
Tim Cox | Brendan Ziolo | |
ZingPR | Certicom Corp. | |
(650) 369-7784 | (613) 254-9267 | |
tim@zingpr.com | bziolo@certicom.com |