Product details
Do you have any problems like this?
Focus Systems will solve that problem!
When developing a system, I would like to consider a security module that provides peace of mind.
I want to complete the security module with one product.
01: Pursue safety by obtaining certification from a third-party organization
Additionally, as a domestic manufacturer, we provide flexible support tailored to our customers, so you can feel safe in terms of both technology and support.
02: Equipped with a wide range of cryptographic modules
Features of C4CS Lite
■Compliant with American standards, safe for public institutions and in-house use
C4CS Lite has obtained FIPS140-2* certification issued by NIST (National Institute of Standards and Technology).
FIPS140-2 is a security requirement for cryptographic modules, so C4CS Lite, which meets the requirements, can be used with confidence in important systems of public institutions and customers.
*Depending on the environment and algorithm used, operation may not be as certified.
■Covering security modules necessary for the system
C4CS Lite has all the security modules necessary for the system, including encryption (common key/public key), hash functions, secret sharing, and key generation.
How to Use
■File encryption <br />You can encrypt each file, and any file that is general digital data can be encrypted.
■Memory encryption <br />Data expanded in memory can be encrypted, and the data capacity does not change before and after encryption, making memory management easy.
Product Specifications
■Installed algorithm
kinds | algorithm | remarks | |
common key cryptography | stream cipher | C4Custom | Developed by Focus Systems, variable key length (C4CS Lite only) |
block cipher | AES | Supports FIPS 197 (AES #360), ECB/CBC/CTR mode | |
public key | signature | RSASSA PKCS #1 v1.5 |
|
RSASSA PSS |
| ||
cryptography | RSAES PKCS #1 v1.5 |
| |
hash function | SHA-256 |
| |
message authentication | HMAC-SHA256 |
| |
Pseudo random number generation | FIPS 186-2 DRNG |
| |
secret sharing | (k, n) threshold secret sharing method |
| |
(k, L, n) threshold secret sharing method |
|
*Please refer to the catalog for details.
■Supported OS
Windows
*For other OS, please contact us.
■Delivery items
CD x 1, license certificate
FAQ
I want to know the price
Please contact us separately.
Is it possible to provide the algorithm alone?
AES/C4Custom can be provided. Please contact us regarding other algorithms.
Related product
C4Sax
SDK library
・Security module for Windows applications and web services ・High-speed, lightweight encryption ・Can be used with Active X
C4U Enterprise
application
・Encryption using just a USB key ・Tamper resistance ・Two-factor authentication for devices
C4Backup/400
application
・Encrypted backup for IBMi ・Detailed encryption method settings possible ・English version available
inquiry
Achievements left behind
48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.
Number of projects per year
500 PJ
Annual number of business partners/customers
200 companies
Maximum number of trading years
47 years
Total number of qualified persons
1,870 people