Product details

crypto module
- C4CS Lite

Do you have any problems like this?

Focus Systems will solve that problem!

When developing a system, I would like to consider a security module that provides peace of mind.

I want to complete the security module with one product.

01: Pursue safety by obtaining certification from a third-party organization

C4CS Lite meets the security requirements for cryptographic modules according to American standards.
Additionally, as a domestic manufacturer, we provide flexible support tailored to our customers, so you can feel safe in terms of both technology and support.

02: Equipped with a wide range of cryptographic modules

C4CS Lite provides a set of various modules necessary for security, so there is no need to procure each module individually.

Features of C4CS Lite

■Compliant with American standards, safe for public institutions and in-house use
C4CS Lite has obtained FIPS140-2* certification issued by NIST (National Institute of Standards and Technology).
FIPS140-2 is a security requirement for cryptographic modules, so C4CS Lite, which meets the requirements, can be used with confidence in important systems of public institutions and customers.

*Depending on the environment and algorithm used, operation may not be as certified.

 

■Covering security modules necessary for the system
C4CS Lite has all the security modules necessary for the system, including encryption (common key/public key), hash functions, secret sharing, and key generation.

How to Use

■File encryption <br />You can encrypt each file, and any file that is general digital data can be encrypted.

 

■Memory encryption <br />Data expanded in memory can be encrypted, and the data capacity does not change before and after encryption, making memory management easy.

Product Specifications

■Installed algorithm

kinds

algorithm

remarks

common key cryptography

stream cipher

C4Custom

Developed by Focus Systems, variable key length (C4CS Lite only)

block cipher

AES

Supports FIPS 197 (AES #360), ECB/CBC/CTR mode

public key

signature

RSASSA PKCS #1 v1.5

 

RSASSA PSS

 

cryptography

RSAES PKCS #1 v1.5

 

hash function

SHA-256

 

message authentication

HMAC-SHA256

 

Pseudo random number generation

FIPS 186-2 DRNG

 

secret sharing

(k, n) threshold secret sharing method

 

(k, L, n) threshold secret sharing method

 

*Please refer to the catalog for details.

■Supported OS
Windows
*For other OS, please contact us.

 

■Delivery items
CD x 1, license certificate

FAQ

I want to know the price

Please contact us separately.

Is it possible to provide the algorithm alone?

AES/C4Custom can be provided. Please contact us regarding other algorithms.

Related product

C4Sax
SDK library

・Security module for Windows applications and web services ・High-speed, lightweight encryption ・Can be used with Active X

C4U Enterprise
application

・Encryption using just a USB key ・Tamper resistance ・Two-factor authentication for devices

C4Backup/400
application

・Encrypted backup for IBMi ・Detailed encryption method settings possible ・English version available

inquiry

Achievements left behind

48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.

Number of projects per year

500 PJ

Annual number of business partners/customers

200 companies

Maximum number of trading years

47 years

Total number of qualified persons

1,870 people