At RSA Conference 2007 Industry Experts Discuss the Factors that Make ECC Ready for Prime Time in TLS

    Panel representing Certicom, Microsoft, Red Hat and Sun Microsystems
    discuss how the Internet, mobile devices and the new TLS standard are
    spurring ECC's adoption

    MISSISSAUGA, ON, Jan. 31 /CNW/ - Certicom (TSX: CIC) today announced that
its chief technology officer, Bill Lattin, will speak at the RSA Conference
2007 about the important new application of elliptic curve cryptography (ECC)
in TLS. He will be joined by fellow panelists Ari Medvinsky from Microsoft
Corp., Bob Lord of Red Hat, and Vipul Gupta from Sun Microsystems, who will
talk about the factors that have spurred this change in an industry
traditionally slow to adopt new cryptographic standards.
    During the session entitled Implementing ECC/Suite-B in TLS: Lessons
Learned, Challenges Ahead, scheduled for February 6 at the Moscone Center, San
Francisco, they will discuss how the evolution of public-key cryptography
combined with the need for secure high performance ubiquitous connectivity
across all types of devices, from servers to wireless sensors, have fueled ECC
adoption. In particular, they will discuss the use of ECC in TLS and share
results from performance benchmarking and interoperability testing from 11
    "Two years ago at the RSA Conference, the NSA announced its Suite-B
specifications. Since then, my fellow panelists and I worked to apply Suite-B
to the TLS protocol," said Lord, senior director of engineering at Red Hat.
"We spent well over a year conducting extensive interoperability tests. The
result is not only a clean RFC (4492), but also products that are
interoperable before they ship. This level of vendor cooperation and customer
focus will shorten the time it takes for ECC to become a mainstream
    "ECC/Suite-B cryptography is a core part of the security foundation in
Windows Vista and is integrated across a wide range of system components,
including IPSec, smartcards, secure mail (S/MIME) and TLS," said David B.
Cross, director of program management for Windows Security Core at Microsoft
Corp. "The collaborative effort presented at this panel underscores
Microsoft's continued commitment to ensuring that these components are
standards-based and interoperable with implementations from other vendors."
    "Security is an industry-wide concern that affects nearly every IT
company and customer. The full value of a new security technology can only be
realized if that technology is deployed broadly and the deployed
implementations interoperate seamlessly," said Gupta, distinguished engineer,
Sun Labs.
    The driving force behind ECC is the need for stronger security that can
hold its strength today and for decades to come. The RSA cryptosystem cannot
scale efficiently with stronger key sizes. ECC offers more security per bit
than other public-key algorithms, so it doesn't compromise performance, a
feature traditionally important in constrained environments such as mobile
devices and chips, but now essential for infrastructure servers and routers.
For years, organizations such as ANSI, IETF and NIST have been adding ECC to
    "2007 promises to be the tipping point for broad adoption of elliptic
curve cryptography," said Lattin. "The National Security Agency has specified
ECC for protecting both sensitive but unclassified as well as classified U.S.
Government information under its Suite-B initiative. The private sector is
also beginning to use ECC, as Suite B has redefined what is considered
industry best practice for cryptographic implementations."

    About Certicom

    Certicom protects the value of your content, applications and devices
with government-approved security. Adopted by the National Security Agency
(NSA) for classified and sensitive but unclassified government communications,
Elliptic Curve Cryptography (ECC) provides the most security per bit of any
known public-key scheme. As the undisputed leader in ECC, Certicom security
offerings are currently licensed to more than 300 customers including General
Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985,
Certicom's corporate offices are in Mississauga, ON, Canada with worldwide
sales and marketing headquarters in Reston, VA and offices in the US, Canada
and Europe. Visit

    Certicom, Certicom ECC Core, Certicom Security Architecture, Certicom
Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder,
Security Builder API, Security Builder BSP, Security Builder Crypto, Security
Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder
MCE, Security Builder NSE, Security Builder PKI and Security Builder SSL are
trademarks or registered trademarks of Certicom Corp. All other companies and
products listed herein are trademarks or registered trademarks of their
respective holders. Information subject to change.

    Except for historical information contained herein, this news release
contains forward-looking statements that involve risks and uncertainties.
Factors which could cause actual results or events to differ materially from
current expectations include, among other things: the ability of the Company
to successfully implement its strategic initiatives and whether such strategic
initiatives will yield the expected benefits; the ability of the Company to
develop, promote and protect its proprietary technology security breaches or
defects in the Company's products; competitive conditions in the businesses in
which the Company participates; changes in consumer spending; the outcome of
legal proceedings as they arise; general economic conditions and normal
business uncertainty; consolidation in the Company's industry and by its
customers; customer preferences towards product offerings; the risk that
customers may cancel their contracts with the Company; reliance on a limited
number of customers; demand for ECC-based technology; performance of the
Company's management team and the Company's ability to attract and retain
skilled employees; operating the Company's business profitably; fluctuations
in revenue and foreign currency exchange rates; interest rate fluctuations and
other changes in borrowing costs; the ability to develop and maintain
strategic relationships; and other factors identified under the heading "Risk
Factors" in the Company's annual information form dated July 26, 2006 and
filed on SEDAR at

    %SEDAR: 00003865E

For further information:

For further information: Lisa Courtney Lloyd, Jolita Communications,
(613) 271-7512,

Organization Profile


More on this organization

Custom Packages

Browse our custom packages or build your own to meet your unique communications needs.

Start today.

CNW Membership

Fill out a CNW membership form or contact us at 1 (877) 269-7890

Learn about CNW services

Request more information about CNW products and services or call us at 1 (877) 269-7890