promo shield edge image

Powerful, portable cryptographic services

The nShield Edge hardware security module (HSM) is a full-featured, portable USB HSM designed for low-volume transaction environments. It’s capable of encryption and key protection and is ideally suited for off-line key generation for certificate authorities (CAs) as well as development and Bring Your Own Key (BYOK) environments.

Beyond Security

nShield Edge Benefits

Icon

Powerful for a Purpose

Perfect for offline key generation and development / Bring Your Own Key (BYOK) environments, with complete algorithm and API support.

Icon

Highly Portable

Small, lightweight design and convenient USB interface supports a variety of host platforms, including portable devices.

Icon

Cost Effective

Your entry-point into HSMs, this economical device lets you scale your environment with other nShield models.

Details

    Tech Specs

    Certifications

    nShield Edge USB HSMs are certified to FIPS 140-2 Level 2 and Level 3.

    Safety and environmental standards compliance

    • UL, CE, FCC, RCM, Canada ICES
    • RoHS2, WEEE

    Supported APIs

    • PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG

    Supported Cryptographic Algorithms

    • Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
    • Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
    • Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
    • Full Suite B implementation with fully licensed ECC, including Brainpool and custom curves

    nShield HSMs offers the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

    Operating Systems

    Windows and Linux operating systems including distributions from RedHat and SUSE.

    Options and Accessories

    CipherTools Developer Toolkit

    The CipherTools Developer Toolkit is a set of tutorials, reference documentation, sample programs and additional libraries. With this toolkit which is included with our standard nShield Security World Software, developers can take full advantage of the advanced integration capabilities of nShield HSMs. In addition to offering support for standard APIs, the toolkit enables you to run custom applications with nShield HSMs.

    Elliptic Curve Cryptography (ECC) activation

    The ECC activation license enables EC-DH, EC-DSA and EC-MQV to be used on an nShield HSMs.

    KCDSA activation

    With the KCDSA activation license, you can use the Korean Certificate-based Digital Signature Algorithm (KCSDA) as well as HAS-160, SEED and ARIA algorithms on an nShield HSMs.

    FIPS certification options

    The nShield Edge is available in FIPS 140-2 Level 2 and Level 3 variants. A non-FIPS developer edition is also offered.

    Related Products

    What our customers are saying...

    Square logo
    Square
    Verifone logo
    Verifone
    Memjet logo
    Memjet
    Polycom logo
    Polycom

    Square

    We have a long history together and we’re extremely comfortable continuing to rely on nCipher solutions for the core of our business. We have used nCipher HSMs for five years and they have always been exceptionally reliable. We’ve layered a lot of code on top of the HSM; it delivers the performance we need and has proven to be a rock-solid foundation.

    Neal Harris, Security Engineering Manager, Square, Inc

    Verifone

    As a global payment solutions and commerce enablement leader, Verifone’s strategy is to develop and deploy “best in class” payment solutions and services that meet or exceed global security standards and help our clients securely accept electronic payments across all channels of commerce. We selected nCipher* HSMs to provide robust security, unmatched performance, and superior scalability across our payment security platforms…

    Joe Majka, Chief Security Officer, Verifone

    Memjet

    nCipher Security’s* nShield sales team provide excellent local and remote support during this evaluation period and was invaluable to the process. The excellent depth, breatdth, and quality of the product documentation gave us confidence that the solution was well though-out and supported.

    Robert Fairlie-Cuninghame, QAI Technical Lead/Architect, Memjet

    Polycom

    nCipher* provided the expertise needed to design and implement a tailored, secure VoIP solution.

    Marek Dutkiewicz, Polycom

    Resources

    Datasheet

    Code Signing Gateway

    White Paper

    Establishing Trust and Integrity with Code Signing

    Contact a Specialist

    An HSM specialist will be in touch with options soon.