Certicom Security for Sensor Networks enables networks to be scalable, mobile and self-configurable
MISSISSAUGA, Ontario – (April 3, 2006)–Certicom Corp. (TSX: CIC) today launched Certicom Security for Sensor Networks, a software module and hardware IP core, that secures low-power, wireless sensor networks. The products use elliptic-curve cryptography (ECC) to add a provable identity to sensor devices, which provides security and reliability from design and development through to the manufacturing, deployment and upgrade of a sensor network.
Today's wireless sensor networks are generally small (fewer than 100 nodes) so symmetric cryptography with centralized control of security is sufficient. However, for sensor networks to reach their potential - to build large, self-healing networks that allow nodes to move as necessary - developers of microcontrollers and sensor networking stacks must move to public-key cryptography, which enables devices to interact and communicate securely. ECC provides more security per bit than other public-key cryptography schemes making it the only option that can meet the footprint and power limitations of a sensor network's constrained devices.
"Security is becoming increasingly critical for wireless sensor network applications, but it needs to operate within the resource and power constraints of a sensor environment," said Joerg Bertholdt, vice president of marketing, Crossbow Technology. "We chose to partner with Certicom because of their experience in providing security solutions for resource-constrained devices and their ECC expertise. With products from Crossbow and Certicom, OEMs will have a hardware and software solution that allows them to bring secure, reliable, wireless sensors to market quickly and cost effectively."
Certicom Security For Sensor Networks includes: Certicom MCE (Microcontroller Edition), a software module that provides cryptographic primitives that interface with the networking stack through a common application programming interface; and Certicom ECC Core a hardware IP core that accelerates and offloads the processor-intensive public-key security operations.
Features and benefits
Provides provable identity:A stored public and private key pair provides a digitally provable identity and facilitates digital signatures and secure key exchange
Flexibility: Node mobility and automated network enrollment methods enable more flexible topologies and a wider variety of applications
Optimized performance: optimized software cryptography and hardware acceleration deliver strong security without impacting network performance
Simplifies network deployment:Provable identity authenticates a node automatically and enables mobility across multiple networks
Reduced cost of ownership: Improved network reliability, simplified management, and no hand-provisioning of nodes reduces the cost of ownership
"The ability for low-power nodes to capture information and communicate with each other wirelessly offers endless possibilities from helping to prevent equipment failures and physical security breaches to improving safety and energy control," said Mitch Blaser, Certicom's product manager. "However, without building strong security in up-front, sensor network adoption could suffer due to similar security pitfalls that slowed the adoption of technologies such as Bluetooth and Wi-Fi."
Certicom Security for Sensor Networks is available this quarter. The price may include developer licenses, royalties, support and services depending on the customer's revenue model and requirements. For more information, visit www.certicom.com/sensors.
Visit Certicom at the Embedded Systems Conference, April 3-7, 2006 at the McEnery Convention Center, San Jose. Booth #1814.
Certicom protects the value of your content, software and devices with government-approved security. Adopted by the National Security Agency (NSA) for classified and sensitive but unclassified government communications, Elliptic Curve Cryptography (ECC) provides the most security per bit of any known public-key scheme. As the undisputed leader in ECC, Certicom security offerings are currently licensed to more than 300 customers including General Dynamics, Motorola, Oracle, Research In Motion and Unisys. Founded in 1985, Certicom's corporate offices are in Mississauga, ON, Canada with worldwide sales headquarters in Reston, VA and offices in the US, Canada and Europe. Visit www.certicom.com
Certicom, Certicom Security Architecture, Certicom Trust Infrastructure, Certicom CodeSign, Certicom KeyInject, Security Builder, Security Builder API, Security Builder BSP, Security Builder Crypto, Security Builder ETS, Security Builder GSE, Security Builder IPSec, Security Builder NSE, Security Builder PKI and Security Builder SSL are trademarks or registered trademarks of Certicom Corp. All other companies and products listed herein are trademarks or registered trademarks of their respective holders. .
Except for historical information contained herein, this news release contains forward-looking statements that involve risks and uncertainties. Actual results may differ materially. Factors that might cause a difference include, but are not limited to, those relating to the acceptance of mobile and wireless devices and the continued growth of e-commerce and m-commerce, the increase of the demand for mutual authentication in m-commerce transactions, the acceptance of Elliptic Curve Cryptography (ECC) technology as an industry standard, the market acceptance of our principal products and sales of our customer's products, the impact of competitive products and technologies, the possibility of our products infringing patents and other intellectual property of fourth parties, and costs of product development. Certicom will not update these forward-looking statements to reflect events or circumstances after the date hereof. More detailed information about potential factors that could affect Certicom's financial results is included in the documents Certicom files from time to time with the Canadian securities regulatory authorities.
The shares of the company described above have been offered only to qualified institutional buyers in reliance on Rule 144A under the Securities Act of 1933, as amended (the "Securities Act"), and outside the United States pursuant to Regulation S of the Securities Act. The shares have not been registered under the Securities Act and may not be offered or sold in the United States or to a U.S. Person absent registration or an applicable exemption from registration requirements.
This press release does not constitute an offer to sell or the solicitation of an offer to buy any security and shall not constitute an offer, solicitation or sale in any jurisdiction in which such offering would be unlawful.
For further information, please contact:
|Lisa Courtney Lloyd||Wendy Moore-Bayley|
|Jolita Communications||Certicom Corp.|
|(613) 271-7512||(613) 254-9268|