Certicom Security Architecture for Embedded allows developers to quickly and cost-effectively build-in security

MISSISSAUGA, Ontario – (March 7, 2005)– Embedded devices that are managed and provisioned via the Internet are appearing in everything from home monitoring systems to cellular phones. These devices are potential targets for hackers, who may be able to exploit a whole new area of vulnerability. This is the driving force behind the Certicom Security Architecture for Embedded launched today by Certicom Corp. (TSX: CIC), the authority for strong, efficient cryptography. Certicom Security Architecture for Embedded enables device manufacturers to create a trusted embedded computing environment that validates a platform and enables applications and higher level protocols to run securely.

Core to Certicom Security Architecture for Embedded is Security Builder® ETS™, an embedded trust services module that provides secure key storage, key management and authentication services to create a trusted platform for smart devices. Developers implement these trust services through a common application programming interface (API) that is portable across multiple chipsets and gives developers the ability to easily migrate from legacy crypto to elliptic curve cryptography (ECC).

Another key component of Certicom Security Architecture is Security Builder® BSP™, a board support package that provides an abstraction layer for trusted platform modules and hardware accelerated cryptography. To develop this version of Security Builder BSP, Certicom worked with Freescale Semiconductor to support its family of PowerQUICC™ processors. Certicom is working with other microprocessor, trusted platform module and smart card vendors.

"A secure, trusted environment is fast becoming a basic requirement for embedded device manufacturers who need to protect private information or protect against fraud and content theft," said Mike Shoemake, PowerQUICC marketing manager for Freescale Semiconductor. "The Certicom Security Architecture for Embedded provides the necessary tools to leverage hardware-based security features found in PowerQUICC processors, such as elliptic cure cryptography, and to provide stronger and faster cryptography. PowerQUICC devices are the only communications processors that support ECC, which is pervasive in wireless applications and is a key factor in enabling end-to-end security with wireless systems."

Certicom Security Architecture for Embedded

  • Comprehensive: Complete security functionality ranging from basic cryptography to protocols and embedded trust services. Meets industry standards such as FIPS, IETF, and NSA Certified products, among others. Wide cryptographic algorithm support, including ECC and legacy RSA.
  • Modular: Modular architecture allows developers to plug in additional functionality that utilizes the same core security architecture. Security services include: SSL, IPSec, PKI, DRM, and Embedded Trust Services.
  • Portable: hardware support packages provide portability across a broad range of trusted platform modules and chipsets, including Freescale PowerQUICC II and PowerQUICC III processors and Intel Wireless Trusted Platform-all through a common, intuitive API, which saves time and money.

"Pervasive computing is driving the need for secure, smart devices. But, adding security to devices can be a daunting job for developers, especially if they lack expertise in cryptography and key management," said Jim Alfred, director of product management at Certicom. "Certicom Security Architecture provides an easy-to-use solution that adds strong, sophisticated security with the added benefits of proven performance and interoperability."

To complement its cryptographic expertise, Certicom is partnering with other vendors who specialize in the embedded sector-including operating system, microprocessor and embedded software vendors. The Certicom Partner Connection was launched today. For more information visit: http://www.certicom.com/partnerconnection.

About Certicom
Certicom Corp. (TSX: CIC) is the authority for strong, efficient cryptography required by software vendors and device manufacturers to embed security in their products. Adopted by the US government's National Security Agency (NSA), Certicom technologies for Elliptic Curve Cryptography (ECC) provide the most security per bit of any known public key scheme, making it ideal for constrained environments. Certicom products and services are currently licensed to more than 300 customers including Motorola, Oracle, Research In Motion, Terayon, Texas Instruments and Unisys. Founded in 1985, Certicom is headquartered in Mississauga, ON, Canada, with offices in Ottawa, ON; Reston, VA; San Mateo, CA; and London, England. Visit www.certicom.com.

For further information, please contact:

For Certicom    
Tim Cox Brendan Ziolo  
ZingPR Certicom Corp.  
(650) 369-7784 (613) 254-9267  
tim@zingpr.com bziolo@certicom.com
Certicom, Security Builder, Security Builder Crypto, Security Builder GSE, Security Builder IPSec, Security Builder Middleware, Security Builder NSE, Security Builder PKI, Security Builder SSL, movianVPN, movianCrypt and movianMail are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.
The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.
This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.