Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content
Certicom ECC Conference
24 Jun 01:49

The growing demand for secure, smart devices, crypto-modernization in government, and new financial applications are driving the adoption of elliptic curve cryptography (ECC), whose combined efficiency and strength make it the ideal public-key technology to meet these security needs.

With this in mind, Certicom Corp. is hosting the second annual Certicom ECC Conference on October 3-5, 2005 in Toronto, Canada, to discuss applications and implementation strategies for ECC. During the conference, experts will discuss two of the hottest topics in the industry today: digital rights management (DRM) and the National Security Agency's (NSA) cryptography recommendations for secure but unclassified information.

This year's key note speaker, David Maher, executive vice president and chief technology officer of Intertrust, will discuss DRM, drawing on his extensive experience in secure computing and his current responsibility for research and development at Intertrust. Intertrust develops and licenses intellectual property for DRM, digital policy management (DPM), and trusted computing.

Also on the agenda for discussion is the U.S. government's Cryptographic Modernization Program and in particular the NSA's advanced cryptography algorithms strategy and recommendations for securing sensitive and unclassified information, known as Suite B. The recommendations name ECC as the exclusive key agreement and digital signature standard to protect sensitive but unclassified information. In 2003, the NSA named ECC as the public-key technology to protect mission-critical information.

ECC is used in a growing number of applications including consumer electronics, mobile handsets, embedded devices, government
communications, and financial services. It is considerably more efficient than legacy public-key schemes, making it ideally suited for resource-constrained environments such as mobile and embedded devices. Its strength and size also allow it to scale more efficiently over time, as stronger security is required. Software developers, hardware engineers, and anyone responsible for
buying or implementing cryptographic systems will benefit from this conference and the exchange of practical ideas and real-world lessons.

Related links: (Open in a new window.)
External link www.certicom.com/conference2005

View Printable View printable version (opens in new window)
Back Back