CO-FOUNDER AND VP TECHNOLOGY,
In this talk, Richard explained how he uses ECC to protect identity and privacy in electronic communications and ultimately prevent spam. He believes a fundamental flaw in today’s security environment begins the moment a user shares his public-key certificate because the certificate puts context around the key, such as who issued it, who owns it, and when it expires. Consequently, anyone who has that information can use it or pass it along.
Using ECC, Avanza has created a technology that protects that information in what Richard calls ‘a managed identity’. The technology creates a strong cryptography string that looks and acts like an email address but includes an encrypted certificate and private key. Every unique electronic relationship has a unique key – which makes it impossible for anyone outside of the relationship to obtain the private information. The key is simple enough that specialized servers are not needed. With its strength and efficient size, ECC, which provides authentication and key exchange, is the only public key that will work.
In this review of the Certicom ECC Conference 2005, we’d like to give you detailed descriptions of each presentation given at the conference because the value of the information warrants it.