Cryptomodules
RTJCrypto
State - A verified fill cipher module that secures key security elements of public sector systems.

Certified encryption for
government and public security
RTJCrypto is a core security module that must be installed in national and public
systems. It not only encrypts and decrypts data, but also plays an important role in
safely managing important security elements such as encryption keys to prevent
information from being leaked, forged, altered, or damaged.
The NIS requires that when introducing certain products to national and public
institutions, they must use the VerifyFill cryptographic module. Detailed adoption
criteria can be found on the National Cyber Security Centre's 'Security Conformity
Verification' page, and additional requirements may be required depending on the
internal regulations of each institution.
Products requiring a verified fill cipher module
-
Type of information security
system- DB encryption
- Single sign-on (SSO)
- Document encryption (DRM, etc.)
- Virtual Private Network (VPN)
- Software-based security USB
- Hosted data leakage prevention
-
Types of cryptographic
equipment- Quantum Key Distribution Equipment
- Quantum Key Management Equipment
- Quantum Communication Encryption Equipment
-
Product types where passwords
are
a primary feature- Mail/Segment/Disk - File encryption
- Hardware segment security tokens
- Other encryption
Features
Reliable advanced
encryption
-
Compatibility

- It supports JRE 8, 17, and 21, ensuring high compatibility across a wide range of server OS environments.
-
Modernity

- We revalidate our cryptographic modules every four years, analyse the latest security trends and implement the latest cryptographic algorithms through our participation in the Korea Cryptography Forum, and have experts in the field of cryptographic algorithms.
-
Ease of development

- It supports Java interfaces and can be easily integrated with JCE and JCA security constructs to leverage security features in a Java environment. (Security features such as encryption, electronic signatures, message authentication, and hashes.)
-
Performance

- Optimised algorithms ensure superior performance.
-
Reliability

- Provides a National Intelligence Agency-validated fill-in-the-blank cipher module to ensure reliability and security.
Architecture
Key features
Classification
Password algorithms
Notes
-
01
Block cipher
- ARIA
- Mode of operation: CBC
- Key length: 128/192/256 bits
- Padding: PKCS7Padding
-
02
Hash functions
- SHA-2(SHA-256/384/512)
-
03
Message authentication
- HMAC (Hash Function Based)
- Hash Functions
- sha-2 (sha-256/384/512)
-
04
Pseudo-Random
Number Generator- HASH-DRBG (hash function based)
- Hash Functions
- sha-2 (sha-384)
-
05
Public-Key
Cryptography- RSAES
- Public key length: 3072
- Hash function: SHA-2 (SHA-256)
-
06
Electronic signatures
- RSA-PSS
- Public key length: 3072
- Hash function: SHA-2 (SHA-256)




