Code and Cipher, published quarterly by Certicom Corp., is an educational newsletter that covers the security and cryptography industry. In each issue we will examine security issues and cryptography trends in an objective manner. We welcome your thoughts, opinions and comments on anything that affects the industry. Please send your feedback on this issue and what you’d like to see in upcoming ones to: codeandcipher@certicom.com.

This article is an overview of the 2nd Annual Certicom ECC Conference which was held in October 2005 at the Four Seasons in Toronto, Canada. The many current and future applications of ECC were discussed by the finest minds in cryptography and security.

Dr. Scott Vanstone discusses the 2nd Annual Certicom ECC Conference, the adoption of ECC and ECC in standards including Suite B.

A discussion by William O'Brien, a Systems Solution Architect with Bell Canada included several case studies to illustrate the importance of ECC's speed, flexibility and efficiency in mobile communications.

 

David Maher was the first keynote of the conference. Maher discussed the evolution of digital rights management (DRM) and the need for efficient and strong cryptography in the new DRM model.

 

Jim Dworkin discussed how the amount of digital content being handled by a network and the increased complexity of attacks is changing the role of the processor well beyond it's original function.

 

Philippe Richard explained how he uses ECC to protect identity and privacy in electronic communications and ultimately prevent spam. Using ECC, Avanza has created a technology that protects information in what Richard calls a "managed identity."

Bill Lattin's presentation surrounded ECC standardization and was the most relevant to the application of ECC. Lattin summarized the many standards being updated to include ECC including ANSI and NIST.