Skip to content
JISA Softech Pvt Ltd
  • Home
  • About Us
  • Products
        • Hardware Security Module
        • Payment HSM
        • Enterprise Key Management
        • Data Security Server
        • Vaultbased Tokenisation
        • Vaultless Tokenisation
        • Aadhaar Data Vault
        • Data Masking
        • Column Level Encryption
        • Application Level Encryption
        • IoT Security Platform
        • Enterprise Code Signing
        • Data Privacy Vault
        • Authentication Solution
        • Aadhaar eKYC Middleware
        • Data Protection and Data Privacy Platform
  • Solutions
    • By Compliance
      • Digital Personal Data Protection act 2023
      • SEBI Cloud Services Adoption Framework
    • HSM-Certificate Authority Use Case
    • HSM-Code Signing Use Case
    • HSM-PKI Use Case
    • HSM-Database Encryption Use Case
    • HSM-Tokenisation Use Case
    • HSM-Digital Signing Solution Use Case
  • Resources
    • Blogs
    • Case Studies
    • Ebooks
    • Whitepapers
    • Latest News
  • Career
  • Contact Us
Get Demo
JISA Softech Pvt Ltd

Hardware Security Module

Home / Hardware Security Module
Hardware security module
A leading Indian OEM for CryptoBind® Network Security Module (HSM) introduces a high performance hardware based transaction security solution for cloud data centers, enterprise, government organizations & ecommerce applications.

Overview

JISA launches CryptoBind® Network Appliance HSM (Hardware Security Module) powered by LiquidSecurity ,HSM family provides a FIPS 140-2 level 3 certified solution that provides elastic and centralized key management and key operation functionality. With upto 1000 partitioned HSMs in a single physical HSM, 100,000 key store independent of key size, 35,000 2048b RSA ops/sec and chaining of up to 20 Appliances, CNN35XX family provides a solution that addresses requirements from few hundred RSA ops/sec or few key stores to 700K RSA ops/sec or 1M key store and everything in-between.

CryptoBind® HSM also comes with EAL4+ Compliant Cryptographic Boundary which makes CryptoBind® HSM EAL4+ Compliant to meet Common Criteria requirements.

This product family, available as a network HSM appliance, offers a no compromise cost efficient solution that addresses the stringent security requirements of SaaS applications, ecommerce payment systems and Enterprise, Banking and Government security applications especially as they migrate to the Public or Private cloud.

Major applications for this product family include Key Management as-a-Service, Database as-a-Service, Crypto as-a-service, Secure DNS, SaaS Applications and Virtual Private Clouds in the Public Cloud.

Hardware security module

Key Features

Below listed are some key feature of CryptoBind® Network Appliance HSM (Hardware Security Module)
  • Upto 1000 partitions per appliance available
  • Up to 10G/sec symmetric / bulk crypto
  • Unlimited client license
  • From 4 to 32 Isolated Single Tenant HSM can be created from one Single HSM Appliance
  • Upto 1 lakh key storage in FIPS boundary
  • PKCS11, JCE, OpenSSL , RestAPI support
  • Available for 500 TPS to 35000 TPS @ RSA 2048 bits
  • Support for multiple ECC curves
  • Division of roles and policies
  • Features
  • Cryptographic Algorithms
  • Block Diagram
Capabilities
  • 35K 2048b RSA ops/sec
  • 10G Bulk crypto / sec
  • 11K ECC ops/sec
  • 100K any size key store in crypto memory
  • Up to 1000 Partitions per appliance
  • Two Factor Authentication
  • Extensive key management

Power Supply
  • 2 x 1U 550W/300W 80+certified Hot Swappable Power Supply
  • Power Efficiency : 94%
  • Output and Input :550W/300W with Input 100 – 240Vac
  • AC Input Freq. : 50-60Hz
  • Power Distributor:
    • O/P: 12V/75A
    • +5V Max: 30A
    • +3.3V Max: 24A
    • -12V Max: 0.6A
  • Power supply terminations for different PCBs is uniform.
Division of Roles
  • Appliance admin: Create, enable/disable partitions but no access to keys in FIPS boundary
  • Partition admin: Create users per partition
  • Partition Users: Create, import keys and use them
Out of the Box solution
  • Cryptographic APIs such as PKCS11, Java JCA, OpenSSL
  • Health checks, Audit logs
Network Interface
  • Dual network Interface
  • option of 1GbE or 10 GbE
Supported OS
  • Windows and Linux
Operating Environment / Compliance
  • Operating temperature: +10°C to +50°C (+50°F to +122°F)
  • Storage temperature: -10°C to +55°C (+14°F to +131°F)
  • Relative humidity: 10% to 95% non-condensing
  • RoHS Compliant
  • Complies with FCC standard for Electromagnetic compatibility (EMC)
Physical specifications network appliance
  • Available as 1U and 2U appliance

RSA
  • KeyGen: 2048, 3072 and 4096-bit
  • PKCS #1 1.5 SigGen: 2048 and 4096-bit (SHA-224, 256, 384, 512)
  • PKCS #1 1.5 SigVer: 1024, 2048 and 4096-bit (SHA-1, 224, 256, 384,512)

DSA
  • PQG Gen: 2048 and 3072-bit (SHA-256)
  • PQG Ver: 1024-bit (SHA-1); 2048 and 3072-bit (SHA-256)
  • Sig Gen: 2048-bit (SHA-224, -256, -384, -512)
  • SigVer: 1024, 2048 and 3072-bit (SHA-1, 224, -256, -384, 512)
ECC
  • ECC CDH: P-224 and P-256 with SHA-256,P-384 and P-521 with SHA-512

HASH
  • SHA: 1, 224, 256, 384, and 512 , MD5
AES
  • ECB mode: Encrypt/Decrypt; 128, 192 and 256-bit
  • CBC mode: Encrypt/Decrypt; 128, 192 and 256-bit
  • GCM mode: Encrypt/Decrypt; 128, 192 and 256-bit

Triple-DES
  • TECB mode; 3-key
  • TCBC mode; 3-key
RNG
  • Hardware Random Number Generator (NDRNG)

Other Supported Algorithms
  • PBE, RC2, RC4, RC5, Diffie-HelliMan
ECDSA
  • PKG: P-224, P-256, P-384, P-521, K-233, K-283, K-409, K571,
  • B-233, B-283, B-409, and B-571
  • PKV: All P, K and B curves
  • Sig Gen: P-224, P-256, P-384, P-521, K-233, K-283, K-409,
  • K-571, B-233, B-283, B-409, and B-571 (SHA-224, -256, –
  • 384, -512)
  • SigVer: All P, K and B curves (SHA-1, 224, -256, -384, -512)

HSM Block Diagram

FAQ

Frequently Asked Questions

A Hardware Security Module is a specialized, highly trusted physical device that executes all key cryptographic operations, such as encryption, decryption, authentication, key management, key exchange, and more. HSMs are specialized security device created solely for the purpose of hiding and safeguarding cryptographic data.

A hardware security module can be advantageous for any company that uses cryptographic keys to protect sensitive or private data. An HSM might be useful if the compromise of your keys would have a negative impact on your company’s ability to comply with regulations, cause data loss, or have other negative effects.

  • Managing cryptographic keys (e.g., Key generation, key storage, key revocation)
  • Use of sensitive data and cryptographic information, for example performing encryption or digital signature operations
  • Use of sensitive data and cryptographic information, for example performing encryption or digital signature operations
  • Aadhaar Authentication
  • Document signing
  • API based signing
  • Secure key backup
  • Encryption
  • Pin Encryption
  • High-level physical and logical protection

The two primary categories of hardware security modules are:

General Purpose: General Purpose HSMs are typically used with Public Key Infrastructures, crypto wallets, and other simple sensitive data. They can utilize the most common encryption algorithms such as PKCS11, AES,DES,RSA, etc.

Payment and Transaction: A payment and transaction HSM is the other type of HSM. These HSMs were developed with the protection of sensitive transaction data, including payment card information, in mind.

The average time to install an HSM is one week. However, it might change depending on your IT infrastructure.

Once the HSM is installed by us, you can get free HSM technical support for 1 year.

We are the first Indian OEM for Hardware Security Module. Our HSM offers elastic and centralized key operation and management features. An HSM is the “Root of Trust” in an organization’s security infrastructure as it is a physical device with a powerful operating system and limited network access. Encryption keys are safely maintained in CryptoBind HSM in accordance with organizational requirements. Our HSM solution has been installed in the Indian Banking Regulator, as well as other government and private organizations.

Download Brochure

Download

Download Key Backup-Restore with External
Hardware Backup Drive Manual

Download

JISA India R&D centre situated in Pune, is a core of a team with excellent technicians and think-tankers with the only objective of delivering simple, efficient and powerful device that meets one’s, particularly routine requirements on technological front. It is our endeavour to provide our consumers, a taste of the technology ahead.

Company
  • Home
  • About Us
  • Blogs
  • Case Studies
  • Whitepapers
  • Career
Products
  • Hardware Security Module
  • Enterprise Key Management
  • Vaultless Tokenisation
  • Vaultbased Tokenisation
  • Aadhaar Data Vault
  • Data Security Server
  • Data Masking
  • Data Privacy Vault
  • Column Level Encryption
  • Application Level Encryption
  • IoT Security Platform
  • Enterprise Code Signing
  • Authentication Solution
  • Aadhaar eKYC Middleware
Facebook Twitter Instagram Linkedin YouTube
  • Privacy Policy

©2024 JISA Softech Pvt. Ltd. All Rights Reserved

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Scroll to top
  • Homepage
  • About Us
  • Products
    • Hardware Security Module
    • Enterprise Key Management
    • Vaultless Tokenisation
    • Vaultbased Tokenisation
    • Aadhaar Data Vault
    • Data Security Server
    • Data Masking
    • Data Privacy Vault
    • Column Level Encryption
    • Application Level Encryption
    • IoT Identity Platform
    • Enterprise Code Signing
    • Authentication Solution
    • Aadhaar eKYC Middleware
  • Solutions
    • By Compliance
      • Digital Personal Data Protection act 2023
      • SEBI Cloud Services Adoption Framework
    • HSM-PKI Use Case
    • HSM-Digital Signing Solution Use Case
    • HSM-Digital Signing Solution Use Case
    • HSM-Database Encryption Use Case
    • HSM-Certificate Authority Use Case
    • HSM-Tokenisation Use Case
  • Resources
    • Blogs
    • Case Studies
    • Whitepapers
  • Career
  • Contact Us
Privacy Overview
JISA Softech Pvt Ltd

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Powered by  GDPR Cookie Compliance