Crypto Store By ID3 > Products > Entrust > Entrust nShield 5c HSM

Entrust nShield 5c HSM

High-performance, next-generation, and crypto-agile hardware security modules

Entrust nShield® 5c hardware security modules (HSMs) are FIPS 140-3 Level 3 certified and Common Criteria EAL4+ (EN 419 221-5) certified appliances that deliver scalable and highly available cryptographic key services across networks.

– High cryptographic transaction rates and flexible scaling
– Integrate with over 150 leading application provider solutions
– Powerful remote configuration and management capability following simple installation
– Integration with Entrust KeyControl for key & secrets management throughout their lifecycle

£19,500.00£42,500.00

Note: RRP shown only. Accurate pricing, specification and availability will be provided upon quote issuance.



Description

Entrust nShield 5c HSM

nShield 5c HSMs are security appliances that deliver cryptographic services to applications across the network, in the cloud, and in hybrid environments. The hardened, tamper-resistant, FIPS 140-3 level 3 certified* platforms perform such functions as encryption, digital signing, and key generation and protection. With their comprehensive capabilities, flexible hybrid deployments, quantum crypto-agility, and 100% compatibility with existing nShield HSM deployments and APIs, these HSMs can support an extensive range of applications, including certificate authorities, code signing, and more.

*FIPS 140-3 Validated, Certificate #4745

nShield 5c HSMs are tamper-resistant devices that perform functions such as encryption, digital signing, and key generation, supporting a range of applications and technologies such as:

– Certificate authorities
– Code signing
– Custom software
– Cloud and containerized applications
– Web services
– Remote signing
– Blockchain
– Database encryption
– 5G telecom
– IoT applications
– Car2X

 

Additional information

Weight 11.5 kg
Dimensions 70.5 × 43.4 × 4.34 cm
Supported cryptographic algorithms

High-performance, next-generation, and crypto-agile hardware security modules

• Full NIST Suite B implementation
• Asymmetric algorithms: RSA, Diffie-Hellman, ECMQV, DSA, El-Gamal, KCDSA, ECDSA (including NIST, Brainpool & secp256k1 curves), ECDH, Edwards (Ed25519, Ed25519ph • Symmetric algorithms: AES, AES-GCM, Arcfour, ARIA, Camellia, MD5 HMAC, RIPEMD160 HMAC, SEED, SHA-1 HMAC, SHA-224 HMAC, SHA-256 HMAC, SHA-384 HMAC, SHA512 HMAC, Tiger HMAC, 3DES
• Hash/message digest: MD5, SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160, RIPEMD160, SHA-3 (224, 256, 384, 512 bit)
• Elliptic Curve Key Agreement (ECKA) available via Java API and nCore APIs
• Elliptic Curve Integrated Encryption Scheme (ECIES) available via Java API, PKCS#11 and nCore APIs
• TUAK and MILENAGE algorithm support for mutual authentication and key generation (3GPP)
• NIST short-listed post-quantum cryptographic algorithms supported using the nShield PostQuantum Option Pack

Supported operating systems

• Windows and Linux operating systems including distributions from Red Hat, SUSE, and major cloud service providers running as virtual machines or in containers

Application programming interfaces (APIs)

• PKCS#11
• OpenSSL • Java (JCE)
• Microsoft CAPI/CNG
• Web Services
• nCore

Host connectivity

• Dual Gigabit Ethernet ports (two network segments with network bonding option)

Security compliance

• FIPS 140-3 Level 3
• eIDAS and Common Criteria EAL4 + AVA_VAN.5 and ALC_FLR.2 certification against EN 419 221-5
• Protection Profile, under the Dutch NSCIB scheme
• Can form the basis of an EN 419 241-2 certified remote signing system for eIDAS
• Compliant with BSI AIS 31 for true and deterministic random number generation

Safety, EMC & environmental compliance

• UL, CE, FCC, UKCA, RCM, Canada ICES
• RoHS, WEEE, REACH

High availability

• All solid-state storage
• Field serviceable fan tray
• Dual hot-swap power supplies
• Full support for clustering HSMs and automated failover/load balancing
• Network bonding supporting active backup mode and 802.3ad mode

Management and monitoring

• KeySafe 5, nShield Remote Configuration
• nShield Remote Administration (purchased separately)
• Secure audit logging
• Syslog diagnostics support and Windows performance monitoring
• SNMP monitoring agent

Models

Base, Mid, High

Physical and Power characteristics

• Standard 1U 19in. rack mount
• Dimensions: 43.4 x 430 x 705mm (1.7 x 16.9 x 27.8in)
• Weight: 11.5kg (25.4lb)
• Input voltage: 100-240V AC auto switching 50-60Hz
• Power consumption: up to 2.0A at 110V AC, 60Hz, 1.0A at 220V AC, 50Hz
• Heat dissipation: 327.6 to 362.0 BTU/hr (full load)
• Reliability – MTBF2: 107,845 hours

Customer Reviews

Customer Rating

£19,500.00£42,500.00
0
0 Ratings
Stars 5
(0)
Stars 4
(0)
Stars 3
(0)
Stars 2
(0)
Stars 1
(0)
Be the first to review “Entrust nShield 5c HSM”

Your email address will not be published. Required fields are marked *

Reviews

There are no reviews yet.

Item added To cart