Infineon And Spyrus Delivers First Advanced Crypto Algorithms Products
Spyrus and Infineon Technologies have announced the availability of personal authentication and security products to support the Global Information Grid, utilizing the new suite of advanced crypto algorithms known as "Suite B."
Suite B is expected to be the de facto standard to protect data for decades to come, for both government and business users.
The Global Information Grid (GIG), as it is being defined by the U.S. Department of Defense (DoD), provides a fundamental shift away from centralized "information-push" technologies, toward a new era of information sharing by authorized users, anywhere, anytime.
Building on the currently available Internet technologies, the GIG will provide to the U.S. DoD, its allies and coalition partners, a secure, highly available, and globally interconnected information environment to meet the real-time and near real-time information needs for security, military, diplomatic, and civil government purposes as well as for commercial enterprises.
The National Security Agency (NSA) publicly announced in October 2003 its intent to adopt elliptic curve cryptography (ECC), which forms the heart of the Suite B algorithms. Spyrus received the first patent sublicense for elliptic curve cryptography that has been issued by the National Security Agency, under the terms of the NSA Field of Use patent license.
The "Field of Use" refers to the technology and methods necessary to implement patented technology, utilizing elliptic curves in GF(p) with key strengths greater than 255-bits, with implementations that are certified to meet the FIPS 140-2 security standard.
Spyrus products implement ECC technology specified for use by the U.S. Government, and increasingly adopted by other governments as well as the commercial sector.
Spyrus products support the full range of ECC curves in GF(p) that have been approved for use by the U.S. Government, from P-256 to P-521. Spyrus products also support the full range of SHA-224/256/384/512, and AES-128/192/256.
The Full and One-Pass ECMQV key establishment schemes are supported, along with the five EC Diffie-Hellman schemes required by NIST's Special Publication SP 800-56. The full range of capabilities that might be selected for a particular application will therefore be available in a FIPS 140-2 certified Spyrus product.
Infineon and Spyrus have been partners since the mid-1990s. Together they produced the first smart card and USB cryptographic token certified to meet the FIPS 140-1 Level 2 and Level 3 security standards, for use in both Government and commercial business enterprises.
This collaboration now provides the market with the first token to offer complete Suite B capabilities to provide the strongest security protection in smart card, USB token, and secure mass storage products available anywhere.
It is being submitted for certification under the stringent FIPS 140-2 Level 3 cryptographic security standard by an agency of the U.S. Government (NIST). The Infineon SLE66CX642P chip is in the process of being certified under Common Criteria at an EAL5+ level of trust by the German Government.
Spyrus plans to migrate its security solution to Infineon's new PE family of secure microcontroller ICs to take advantage of enhanced features including more efficient EEPROM programming, 33MHz CPU clock, and smaller die size.
These technologies include Infineon's multi-layer chip design, which includes an active shield to prevent tampering, the Advanced Cryptographic Engine (ACE) as well as a Triple DES cryptographic coprocessor to accelerate RSA, ECC and DES computations, together with state-of-the-art techniques to defeat possible side-channel analysis attacks.
These techniques include instruction timing randomization, complementary balanced circuitry, encrypted memory bus transfers, and current scrambling techniques.
Spyrus technologies build upon that solid security base by utilizing their own intellectual property and algorithm implementations to add highly optimized support for ECC, AES, SHA-2, RSA, DSA, and other legacy algorithms running on their secure smart card operating system (SPYCOS).
"This partnership between Infineon and Spyrus provides new, cost-effective opportunities for customers while offering best-in-class security features," said Joerg Borchert, VP for Chip Card and Security ICs, Infineon Technologies North America.
"Combining Infineon's leading edge security microcontroller technology with Spyrus' embedded technologies will provide customers with improved legacy performance together with Suite B product capabilities today and ultimately improve time to deployment for systems with maximum security protection."
"Spyrus is committed to providing products that meet the U.S. Government's highest standards to secure and protect sensitive information," said Sue Pontius, President and CEO of Spyrus.
"With NSA's grant of the ECC license to Spyrus, we are ready to meet the anticipated demand in all markets that require strong security. Combining Infineon's security IC expertise with our cryptographic implementation has enabled Spyrus to be first to market with the most advanced products available today."
Subscribe To SpaceWar Express
Wireless Networks: Open To Stealth Attacks
Washington (UPI) Feb 22, 2005
Wireless networks could link up police on the streets, soldiers in the battlefield and rescue workers in disaster zones, but computer scientists warned they remain dangerously vulnerable to stealth attacks.
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2016 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.|