Cryptography


MOBILWITHUS provides cryptographic modules that meet global and national standard cryptographic algorithms.


"Cryptography is the foundation of security technology"


Provides professional encryption technologies


MOBILWITHUS provides professional encryption technologies using quantum crptography, hardware accelerators, and hardware security modules, taking into account the mobility embedded convergence environments.


MOBILWITHUS is 100% compliance with national and global standards and verification standards. We provides cryptographic modules optimized for customer development environments and service requirements in software, frimware, and hardware.

Cryptography


MOBILWITHUS provides cryptographic modules that meet global and national standard cryptographic algorithms.

"Cryptography is the foundation of security technology"

Provides professional encryption technologies


MOBILWITHUS provides professional encryption technologies 

using quantum cryptography, hardware accelerators, and hardware security modules, 

taking into account the development of computing environments, robot and mobility embedded convergence environments.


MOBILWITHUS is 100% compliance with national and global standards and verification standards. 

We provides cryptographic modules optimized for customer development environments and service requirements in software, firmware, and hardware.

MOBIL CRYPTO+


| Global & Korea Standard Cryptography Algorithm


Provides cryptographic algorithm implementation software and firmware to implement functions such as confidentiality, integrity, authentication, and denial prevention to prevent leakage, forgery, and damage of information for the purpose of storing and protecting business data or sensitive data during communication 


· Provides the latest domestic and international standard cryptographic algorithms

· Verified by global automotive  OEM, Tier, and semiconductor 

· Korea Cryptography Module Validation Program(in progress)

| Korea Cryptography Algorithm List


구분암호 알고리즘비고
Block cipher

ARIA |K| : 128/192/256bit

Mode : ECB/CBC/CTR/CCM/GCM

Firmware / Software

Hash

SHA256bit

Mac

HMAC : SHA256bit

GMAC : ARIA, |K| : 128/192/256bit

CMAC : ARIA, |K| : 128/192/256bit

Random Generation

CTR-DRBG, ARIA, |K| : 128bit

Digital Signature

ECDSA(p-256, SHA256bit)

Key

ECDH(p-256)


| Global Cryptography Algorithm List


구분암호 알고리즘비고

Block Cipher

AES |K| : 128/192/256bit

Mode : ECB/CBC/CTR/GCM

Hardware Engine / Software


Hash

SHA256/512bit

MAC

HMAC : SHA256/512bit

GMAC : AES, |K| : 128/256bit

CMAC : AES, |K| : 128/256bit

RNG

CTR-DRBG, AES, |K| : 128bit

DSA

RSA(1024, 2048)-PSS/PKCS#1.5

ECDSA(p-256, SHA256bit)

KEM

ECDH(p-256)

PBKDF2


MOBIL Post Quantum+



| Post Quantum Cryptography Module


Considering the quantum computing environment, a secure cryptographic algorithm is provided in software to respond to the disabling of the current cryptographic algorithm


| Post Quantum Crypto Algorithm List


Class
Algorithm
Type
PKE/KEM
ML-KEM
Software
Digital Signature
ML-DSA
SLH-DSA




MOBIL Consulting


| Cryptography Module Validation Consulting and Others


Provides cryptographic module design and customized consulting based on application and service or environmental requirements for developing specialized implementations such as semiconductor specialized environments


· Additional crypto algorithm for automotive MCAL

· Design and development of special environment. ex, Robot, Drone etc.

· Supporting Various development environment. ex. ARM, MIPS, RISK-V, x86

· Design and production custom evaluation board

· Optimization of power assumption and performance