A

This device was developed to perform cryptographic operations such as encryption, signing, signature verification, and digest, with high performance and securely over a network. Communication between the device and the client is carried out through secure channels established with mutual authentication. As a result of storing the keys used in transactions within the physical attack protected cryptographic boundary, high security is provided for these sensitive devices.

Critical security operations such as initialization, backup, software update, user authentication are performed after the national smart card operating system AKIS-based authorization and authentication. The device also offers a national solution to key generation with its national random number generator.

  • Cryptographic Features
  • Management
  • Performance
  • Supported
  • Physical Interface

RSA, ECDSA, DSA AES, TripleDES, DES SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD160 SHA-1 HMAC, SHA-224 HMAC, SHA-256 HMAC, SHA-384 HMAC SHA-512 HMAC RSA, ECDSA, DSA asymmetric key generation, AES, DES, TripleDES symmetric key generation Secp prime curves and custom prime processing with curves National random number generator.

Remote device management GUI and command line management program for remote management 4.3 inch touch screen for management on the device M-of-N manager verification in critical transactions Storing transactions records Up to 256 PKCS#11 slots Up to 32 client connections Backup and upload from backup.

RSA 2048-bit sign 520 op/second RSA 4096-bit sign 110 op/second ECDSA 256-bit prime sign 1600 op/second

Operating System Linux, Windows

Gigabit Ethernet

Request info About Our Portfolios