ARM’s highest performing processor, extending the capabilities of mobile and enterprise computing. Read More...
Certicom Security Architecture
The Certicom Security Architecture (CSA) is portable, modular, and consists of Certicom Security Services and Certicom Cryptographic Providers that enable you to meet NSA Suite B guidelines and includes a pre-approved FIPS 140-2 cryptographic module.
The Certicom Security Architecture offers security services for SSL, IPSec, PKI, DRM, Embedded Trust Services (ETS), and SRTP/MIKEY. In addition, CSA includes a proven UMA solution as well as an 802.1x Supplicant. And with Certicom Board Support Packages (BSP), you can expose cryptographic functionality available in hardware and take advantage of a wide range of Certicom Suite B Intellectual Property (IP) Cores.
Certicom Security Services
As the source technology for the NSA’s Suite B secure communications guidelines and a security provider to 4 of the 5 largest handset manufacturers, Certicom technology delivers the most efficient and strongest security-per-bit in the world. With crypto libraries, HW and services being leveraged throughout the embedded community, our technology is optimized for constrained environments. With a comprehensive set of solutions, Certicom Security Services range from our award-winning IPSec that enables customers to achieve highly secure VPN access more efficiently to a proven UMA solution that enables customers to meet emerging market demands.
Certicom offers complete SSL/TLS protocol security that offers a single API for over 30 platforms and is optimized for constrained devices and wireless applications. Also, Certicom delivers SRTP/MIKEY and 802.1x solutions as well as a PKI digital certificate management module that enables you to get to market quickly with proven public key infrastructure security.
Certicom Cryptographic Providers
Delivering the most security-per-bit in the world, Certicom provides customers with high-performance cryptographic providers that are ideal for enterprise applications, constrained devices, and communications.
Certicom Cryptographic Providers help you optimize cryptographic routines and improve security performance. They also enable you to embed cryptographic functionality into hardware with Board Support Packages (BSP) and Certicom IP Cores. In addition, they enable applications to handle encryption, decryption, digital signatures, and message authentication.
Certicom Security Services include a pre-approved FIPS 140-2 cryptographic module that can be easily embedded into customer solutions, save development teams months of effort, and help you avoid a lengthy government approval process.
And Cryptographic Providers are connected by a single API that abstracts away the differences among cryptographic providers. As a result, changing providers and chipsets only requires changing linkages to applications as opposed to the far more lengthy process of recoding the application itself.