nShield Connect

nShield Connect HSMs are certified hardware security appliances that deliver cryptographic services to a variety of applications across the network. 

Entrust nShield HSM appliances are hardened, tamper-resistant platforms that perform such functions as encryption, digital signing, and key generation and protection. With their comprehensive capabilities, these HSMs can support an extensive range of applications, including certificate authorities, code signing and more.

Optimal Architecture - Entrust's Security World provides scalability, seamless failover, and load balancing.

Accelerated data processing - one of the fastest crypto execution speeds in the industry.

Secure business and application logic - cryptographic protection of software applications and the processed data.

 

Tech Specs

 

Certified Hardware Solutions

Entrust has earned a broad set of certifications for nShield products. These certifications help our customers to demonstrate compliance while also giving them the assurance that their nShield HSMs meet stringent industry standards.

Security Compliance

  • FIPS 140-2 Level 2 and Level 3
  • USGv6 accreditation
  • eIDAS and Common Criteria EAL4 + AVA_VAN.5 and ALC_FLR.2 certification against EN 419 221-5 Protection Profile, under the Dutch NSCIB scheme
    • Can form the basis of an EN 419 241-2 certified remote signing system for eIDAS.
    • Compliant with BSI AIS 31 for true and deterministic random number generation
  • Common Criteria EAL4+ (AVA_VAN.5) for nShield Connect+ models
  • Recognition of nShield Connect+ as a Qualified Signature Creation Device (QSCD)
  • ICP Brazil certification to NSC3 level
  • Singapore CSA NITES certification for nShield Connect XC models

Safety and Environmental Standards Compliance

  • UL, CE, FCC, RCM, Canada ICES
  • RoHS2, WEEE

High Transaction Rates

nShield HSMs boast high elliptic curve cryptography (ECC) and RSA transaction rates. ECC, one of the most efficient cryptographic algorithms, is particularly favored where low power consumption is crucial, such as applications running on small sensors or mobile devices.

nShield Connect Models500+XC Base1500+6000+XC MidXC High
RSA Signing Performance (tps) for NIST Recommended Key Lengths
2048 bit150430450300035008600
4096 bit801001905008502025
ECC Prime Curve Signing Performance (tps) for NIST Recommended Key Lengths
256 bit5406801260240075121144001

Note 1: Performance indicated requires ECDSA fast RNG feature activation available free of charge on request from Entrust Support.

Wide Support for APIs, Cryptographic Algorithms and OSs

Supported APIs

  • PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI/ CNG and Web Services (requires Web Services Option Pack)

Supported Cryptographic Algorithms

  • Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
  • Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
  • Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
  • Full Suite B implementation with fully licensed ECC including Brainpool and custom curves
  • Elliptic Curve Key Agreement (ECKA) available via Java API and nCore APIs
  • Elliptic Curve Integrated Encryption Scheme (ECIES) available via Java API, PKCS#11 and nCore APIs

nShield HSMs offers support for the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

Supported Platforms

Windows and Linux operating systems including distributions from RedHat, SUSE and major cloud service providers running as virtual machines or in containers.

Reliability

Calculated at 25°C operating temperature using Telcordia SR-332 “Reliability Prediction Procedure for Electronic Equipment” MTBF Standard

  • Connect XC   107,384 hours
  • Connect+   99,284 hours

Related Products

PCI-Express card-based HSMs that deliver cryptographic key services to applications hosted on individual servers and appliances.

USB-connected desktop HSMs that provide convenience and economy for environments requiring low-volume cryptographic key services.

Networked appliances that deliver cryptographic key services to applications distributed across servers and virtual machines.

Contact us

Do you have any further questions? Go ahead and send us your enquiry! Our team will get back to you as soon as possible.