thales e-security thales e-security...

2
CipherTools™ enables developers to create or enhance business applications to make optimal use of the high assurance features offered by Thales nShield hardware security modules (HSMs). Empowering customers to exercise full control over the use of cryptography in their organization, CipherTools is specifically designed to facilitate the development of software applications that run in cloud, server or workstation environments, enabling them to deliver secure key management for sensitive private keys, increased cryptographic processing performance, scalability, and fail-over resilience. Thales e-Security Thales e-Security CipherTools Key Benefits Maximizes developer productivity through easily compiled sample code and detailed documentation Enables developers to choose between industry standard and Thales specific APIs Allows vulnerable software-based encryption implementations to use tamper resistant nShield HSMs Enables scalable lifecycle management of key material and facilitates failover and disaster recovery using the Thales Security World key management architecture Interoperates with wide range of hardware and operating systems, enabling key material used by host-side applications to be platform independent and transportable SOFTWARE DEVELOPMENT TOOLKIT www.thales-esecurity.com

Upload: lythien

Post on 07-May-2019

269 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Thales e-Security Thales e-Security CipherToolsgo.thalesesecurity.com/.../images/ThalesEsecurity_CipherTools_ds.pdf · cryptography in their organization, ... Thales e-Security CipherTools

CipherTools™ enables developers to create or enhance business applications to make optimal use of the high assurance features offered by Thales nShield hardware security modules (HSMs). Empowering customers to exercise full control over the use of cryptography in their organization, CipherTools is specifically designed to facilitate the development of software applications that run in cloud, server or workstation environments, enabling them to deliver secure key management for sensitive private keys, increased cryptographic processing performance, scalability, and fail-over resilience.

Thales e-Security

Thales e-Security CipherTools™

Key Benefits• Maximizes developer productivity through easily compiled

sample code and detailed documentation• Enables developers to choose between industry standard

and Thales specific APIs• Allows vulnerable software-based encryption implementations to use tamper resistant nShield HSMs

• Enables scalable lifecycle management of key material and facilitates failover and disaster recovery using the Thales Security World key management architecture• Interoperates with wide range of hardware and operating

systems, enabling key material used by host-side applications to be platform independent and transportable

SOFTWARE DEVELOPMENT TOOLKIT

www.t hales-esecurity.com

Page 2: Thales e-Security Thales e-Security CipherToolsgo.thalesesecurity.com/.../images/ThalesEsecurity_CipherTools_ds.pdf · cryptography in their organization, ... Thales e-Security CipherTools

• Fully licensed Elliptic Curve Cryptography (ECC) (Including Brainpool and custom curves)

Supported OS Platforms• Windows• Linux (Red Hat and SUSE)• Solaris• IBM AIX• HP-UX

Target Hardware• All nShield models

– nShield Solo – nShield Connect – nShield Edge (Windows only)

• Performance (signatures/second) – Up to 6,000 (RSA) – Up to 2,400 (ECC)

• Supported interfaces – PCI/PCIe, Ethernet, and USB• Backup resiliency by adding multiple HSMs• Unlimited key storage via Security World key management architecture

Professional Service Offerings• Expert developer support• Developer training• Design assistance• Code Review • Custom application development

Compatibility and Licensing• Compatible with all nShield HSMs• Licensed on a developer seat basis• Allows unlimited/license-free nShield enhanced applications to be created

Toolkit Contents• Software to install on Unix or Windows platform• Thales libraries (header files, sample code and documentation)• Full details of Thales vendor extensions• Cryptographic hardware interface library• Microsoft CryptoAPI/CNG• Thales Java/JCE plus Java documentation and sample code• Crypto API guide• nCore developer tutorial• Developer samples kit and tutorials• Additional C and Java libraries for developers use

Supported Algorithms• Asymmetric public key ciphers – RSA (1024, 2048, 4096), Diffie-Hellman, DSA, El-Gamal, KCDSA, ECDSA, ECDH• Symmetric ciphers

– AES, ARIA, Camellia, CAST, DES, RIPEMD160 HMAC, SEED, Triple DES

• Hash Functions• SHA-1, SHA-2 (224, 256, 384, 512 bit)• Full Suite B implementation

©T

hale

s-

Janu

ary

2013

•L

H09

67

Thales e-Security CipherTools™TECHNICAL SPECIFICATIONS*

In

du

stry

St

an

dard

API

s

Application Key Types Security Policy

Thale

s Se

curi

ty W

orl

d S

up

portPKCS#11 Using PKCS#11 All nShield supported key types

except El-GamalSubset of Security World features mapped onto industry standard API

Microsoft Crypto API/CNG

Using Microsoft CryptoAPI/CNG

CryptoAPI: RSA, DSA, DH CNG: RSA, DSA, ECDSA, DH, ECDH

Java/JCE Using Java/JCE RSA, DSA, 3DES, AES

OpenSSL Using OpenSSL and CHIL engine

RSA, DSA, DH Security World features and policies supported

Thale

s Lo

w L

evel

A

pplic

atio

n

Inte

rface

nCore Using custom C or Java

All nShield supported key types Security World features and policies supported – fully custom security policies possible

Americas – Thales e-Security Inc. 900 South Pine Island Road, Suite 710, Plantation, FL 33324 USA • Tel:+1 888 744 4976 or +1 954 888 6200 • Fax:+1 954 888 6211 • E-mail: [email protected] Pacific – Unit 4101 41/F 248, Queen’s Road East, Wanchai, Hong Kong, PRC • Tel:+852 2815 8633 • Fax:+852 2815 8141 • E-mail: [email protected], Middle East, Africa – Meadow View House, Long Crendon, Aylesbury, Buckinghamshire HP18 9EQ • Tel:+44 (0)1844 201800 • Fax:+44 (0)1844 208550 • E-mail: [email protected]

Follow us on: