The Korea Internet & Security Agency (KISA) announced on the 24th that it is recruiting companies to participate in consulting for the development of verification submissions for cryptographic modules to secure technological capability and support business expansion for micro and small enterprises, in collaboration with the Ministry of Science and ICT and the National Intelligence Service. The recruitment period runs from the 25th to the 11th of next month.
Cryptographic module verification is a system that verifies the safety and implementation suitability of cryptographic modules to protect the data communicated over national and public institution information and communication networks. To use cryptographic-related products in national and public institution information and communication networks, businesses must equip verified cryptographic modules in the relevant products. However, micro and small enterprises are struggling to secure technological capability and expand their businesses due to a lack of specialized personnel and budget.
In response, KISA plans to select and support small and medium-sized enterprises through this consulting. The main support contents include ▲ interpretation of cryptographic module verification standards ▲ provision of cryptographic module samples and guidelines ▲ document preparation including basic and detailed design documents and test papers ▲ transfer of cryptographic module design and implementation technology.
This consulting can be applied for free by domestic micro and small enterprises that wish to receive cryptographic module verification. More detailed information can be found on the KISA official website or the website for promoting the use of cryptography.
Park Hae-ryong, head of KISA's Security Technology Division, noted, "This consulting will be an opportunity to elevate the cryptographic module development capabilities of micro and small enterprises," and added, "We will actively support efforts to become a practical breakthrough for micro and small enterprises that face difficulties in securing technological capability and in the commercialization process for cryptographic module verification."