Cryptography
MOBILWITHUS provides cryptographic modules that meet global and national standard cryptographic algorithms.
"Cryptography is the foundation of security technology"
Provides professional encryption technologies
MOBILWITHUS provides professional encryption technologies using quantum crptography, hardware accelerators, and hardware security modules, taking into account the mobility embedded convergence environments.
MOBILWITHUS is 100% compliance with national and global standards and verification standards. We provides cryptographic modules optimized for customer development environments and service requirements in software, frimware, and hardware.
"Cryptography is the foundation of security technology"
MOBILWITHUS provides professional encryption technologies
using quantum cryptography, hardware accelerators, and hardware security modules,
taking into account the development of computing environments, robot and mobility embedded convergence environments.
MOBILWITHUS is 100% compliance with national and global standards and verification standards.
We provides cryptographic modules optimized for customer development environments and service requirements in software, firmware, and hardware.
MOBIL CRYPTO+
| Global & Korea Standard Cryptography Algorithm
Provides cryptographic algorithm implementation software and firmware to implement functions such as confidentiality, integrity, authentication, and denial prevention to prevent leakage, forgery, and damage of information for the purpose of storing and protecting business data or sensitive data during communication
· Provides the latest domestic and international standard cryptographic algorithms
· Verified by global automotive OEM, Tier, and semiconductor
· Korea Cryptography Module Validation Program(in progress)
| Korea Cryptography Algorithm List
๊ตฌ๋ถ | ์ํธ ์๊ณ ๋ฆฌ์ฆ | ๋น๊ณ |
---|---|---|
Block cipher | ARIA |K| : 128/192/256bit Mode : ECB/CBC/CTR/CCM/GCM | Firmware / Software |
Hash | SHA256bit | |
Mac | HMAC : SHA256bit GMAC : ARIA, |K| : 128/192/256bit CMAC : ARIA, |K| : 128/192/256bit | |
Random Generation | CTR-DRBG, ARIA, |K| : 128bit | |
Digital Signature | ECDSA(p-256, SHA256bit) | |
Key | ECDH(p-256) |
| Global Cryptography Algorithm List
๊ตฌ๋ถ | ์ํธ ์๊ณ ๋ฆฌ์ฆ | ๋น๊ณ |
---|---|---|
Block Cipher | AES |K| : 128/192/256bit Mode : ECB/CBC/CTR/GCM | Hardware Engine / Software |
Hash | SHA256/512bit | |
MAC | HMAC : SHA256/512bit GMAC : AES, |K| : 128/256bit CMAC : AES, |K| : 128/256bit | |
RNG | CTR-DRBG, AES, |K| : 128bit | |
DSA | RSA(1024, 2048)-PSS/PKCS#1.5 ECDSA(p-256, SHA256bit) | |
KEM | ECDH(p-256) PBKDF2 |
MOBIL Post Quantum+
| Post Quantum Cryptography Module
Considering the quantum computing environment, a secure cryptographic algorithm is provided in software to respond to the disabling of the current cryptographic algorithm
| Post Quantum Crypto Algorithm List
Class | Algorithm | Type |
---|---|---|
PKE/KEM | ML-KEM | Software |
Digital Signature | ML-DSA SLH-DSA |
MOBIL Consulting
| Cryptography Module Validation Consulting and Others
Provides cryptographic module design and customized consulting based on application and service or environmental requirements for developing specialized implementations such as semiconductor specialized environments
· Additional crypto algorithm for automotive MCAL
· Design and development of special environment. ex, Robot, Drone etc.
· Supporting Various development environment. ex. ARM, MIPS, RISK-V, x86
· Design and production custom evaluation board
· Optimization of power assumption and performance