메인메뉴 바로가기 본문내용 바로가기

Cryptomodules

RTJCrypto

State - A verified fill cipher module that secures key security elements of public sector systems.

Certified encryption for
government and public security

RTJCrypto is a core security module that must be installed in national and public
systems. It not only encrypts and decrypts data, but also plays an important role in
safely managing important security elements such as encryption keys to prevent
information from being leaked, forged, altered, or damaged.

The NIS requires that when introducing certain products to national and public
institutions, they must use the VerifyFill cryptographic module. Detailed adoption
criteria can be found on the National Cyber Security Centre's 'Security Conformity
Verification' page, and additional requirements may be required depending on the
internal regulations of each institution.

Products requiring a verified fill cipher module

  • Type of information security
    system

    • DB encryption
    • Single sign-on (SSO)
    • Document encryption (DRM, etc.)
    • Virtual Private Network (VPN)
    • Software-based security USB
    • Hosted data leakage prevention
  • Types of cryptographic
    equipment

    • Quantum Key Distribution Equipment
    • Quantum Key Management Equipment
    • Quantum Communication Encryption Equipment
  • Product types where passwords
    are
    a primary feature

    • Mail/Segment/Disk - File encryption
    • Hardware segment security tokens
    • Other encryption
Cryptographic Module

Features

Reliable advanced
encryption

Compatibility

It supports JRE 8, 17, and 21, ensuring high compatibility across a wide range of server OS environments.

Modernity

We revalidate our cryptographic modules every four years, analyse the latest security trends and implement the latest cryptographic algorithms through our participation in the Korea Cryptography Forum, and have experts in the field of cryptographic algorithms.

Ease of development

It supports Java interfaces and can be easily integrated with JCE and JCA security constructs to leverage security features in a Java environment. (Security features such as encryption, electronic signatures, message authentication, and hashes.)

Performance

Optimised algorithms ensure superior performance.

Reliability

Provides a National Intelligence Agency-validated fill-in-the-blank cipher module to ensure reliability and security.

Architecture

Key features

Classification

Password algorithms

Notes

  • 01

    Block cipher

    • ARIA
    • Mode of operation: CBC
    • Key length: 128/192/256 bits
    • Padding: PKCS7Padding
  • 02

    Hash functions

    • SHA-2(SHA-256/384/512)
  • 03

    Message authentication

    • HMAC (Hash Function Based)
    • Hash Functions
      - sha-2 (sha-256/384/512)
  • 04

    Pseudo-Random
    Number Generator

    • HASH-DRBG (hash function based)
    • Hash Functions
      - sha-2 (sha-384)
  • 05

    Public-Key
    Cryptography

    • RSAES
    • Public key length: 3072
    • Hash function: SHA-2 (SHA-256)
  • 06

    Electronic signatures

    • RSA-PSS
    • Public key length: 3072
    • Hash function: SHA-2 (SHA-256)

Business Impact

Reliability

  • High reliability with a verifiable fill cipher module

Interoperability

  • Implement cryptomodules based on standards conformance to ensure interoperability in different environments

Ease of application

  • Easy API adaptation to Java-based applications ensures high ease of adoption

Versatility

  • Highly universal, applicable to any OS environment that supports Java

Future-proofing

  • Works with quantum-resistant cryptomodules (PQC) to secure data in quantum computing environments

Secure Your Business
with Next-Gen IAM

From corporate account and privilege management to SSO/MFA authentication, build a secure and efficient security environment with Rathontech.

Get started