Certicom Security for Silicon Design Protection combines multi-stage authentication and key generation to protect IP and secure offshore manufacturing process

MISSISSAUGA, Ontario – (July 24, 2006) – Today, Certicom Corp. (TSX: CIC) launched Certicom® Security for Silicon Design Protection™ to help fabless semiconductor designers protect proprietary chip designs and reduce the growing problem of illicit surplus chip manufacturing for the gray market.

Certicom Security for Silicon Design Protection combines the original software-based Certicom® KeyInject™ system with a new hardware IP core to enforce security policies throughout the silicon manufacturing process. If third-party manufacturers produce chips for sale in the gray market, Certicom’s security solution renders the counterfeit silicon unusable while ensuring that legitimately produced chips work as intended.

Certicom KeyInject software adds cryptographic keying material to the silicon at various stages of the chip production process. These keys are used to “unlock” the IP core, which is added to the chip design. If all of the keys are not used, i.e. a stage of the legitimate process has been bypassed, the chip will not be usable. Certicom Security for Silicon Design Protection also enables fabless design companies to track key usage by metering the keys and producing an audit trail for each sub-contractor.

“Gray market production is one of most challenging issues facing the electronics industry today. Certicom Security for Silicon Design Protection will help alleviate that problem and make low-cost silicon foundries as reliable as high-priced alternatives,” said Jim Alfred, director of product management at Certicom. “Certicom’s new product creates a multi-level authentication process that with even one missed step will result in a crippled and unusable chip. It works on the same basis as a two-key safety deposit box lock. The box won’t open if you don’t have all of the keys.”

Benefits of Certicom Security for Silicon Design Protection:

  • Protects IP and eliminates gray market threats through strong security software and hardware system
  • Provides ability to track and audit keying material to maintain better control over production process
  • Increases bottom-line profitability by providing a secure system for outsourcing manufacturing process

Certicom Security for Silicon Design Protection is available this quarter and is priced depending on the number of sites. For more information visit: www.certicom.com/fabless

About Certicom
Certicom protects the value of your content, applications and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com

Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders.

Forward-Looking Statements
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.

The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.

This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.

For further information, please contact:

For Certicom    
Lisa Courtney Lloyd    
Jolita Communications    
(613) 271-7512