nShield Edge HSMs

nShield Edge hardware security modules (HSMs) are USB-connected desktop devices that provide convenience and economy for environments requiring low-volume cryptographic key services.

nShield Edge

nShield Edge

The nShield Edge is a full-featured, portable HSM designed for low-volume transaction environments. This USB-connected device delivers capabilities for encryption and key protection, and is ideally suited for off-line key generation for certificate authorities (CAs) as well as development environments.

Ideal for low-volume transaction environments

Suits off-line key generation and development environments, while delivering complete algorithm and API support.

Highly portable

Small, lightweight design with convenient USB interface supports a wide variety of host platforms, including laptops and other portable devices.

Cost effective

The most economical HSM in the nShield family, nShield Edge gives you an entry-point HSM, while letting you scale your environment with other nShield models as needed.

Certified hardware solutions

Thales e-Security has earned a broad set of certifications for nShield products. These certifications help our customers to demonstrate compliance while also giving them the assurance that their nShield HSMs meet stringent industry standards.

nShield Edge HSMs are certified to FIPS 140-2 Level 2 and Level 3.

Safety and environmental standards compliance:

  • UL, CE, FCC, C-TICK, Canada ICES
  • RoHS2, WEEE
Wide support for APIs and cryptographic algorithms

Supported APIs

  • PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG

Supported Cryptographic Algorithms

  • Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH
  • Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
  • Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
  • Full Suite B implementation with fully licensed ECC, including Brainpool and custom curves

nShield HSMs offers the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

Operating Systems

  • Windows and Linux
CipherTools Developer Toolkit

The CipherTools Developer Toolkit is a set of tutorials, reference documentation, sample programs and additional libraries. With this toolkit, developers can take full advantage of the advanced integration capabilities of nShield HSMs. In addition to offering support for standard APIs, the toolkit enables you to run custom applications with nShield HSMs.

Elliptic Curve Cryptography (ECC) activation

The ECC activation license enables EC-DH, EC-DSA and EC-MQV to be used on an nShield HSM.

KCDSA activation

With the KCDSA activation license, you can use the Korean Certificate-based Digital Signature Algorithm (KCSDA) as well as HAS-160, SEED and ARIA algorithms on an nShield HSM.

FIPS certification options

The nShield Edge is available in FIPS 140-2 Level 2 and Level 3 variants. A non-FIPS developer edition is also offered.

Data Sheet : nShield Edge

The nShield Edge is the universal serial bus (USB)-attached hardware security module (HSM) in the Thales family of high security data protection solutions. The nShield Edge combines a full-featured HSM with a smart card reader in one portable device, offering secure backup and dual control access to an organization’s high-value keys for low transaction volume environments. The independently certified platform performs key management and cryptographic operations such as encryption and digital signing on behalf of a wide range of commercial and custom-built business applications and critical security systems including offline certificate authorities (CAs) for public key infrastructures (PKIs), code signing and remote HSM management.


White Paper : Thales Security World

The Thales Security World architecture supports a specialized key management framework that spans the entire nShield family of general purpose hardware security modules (HSMs). Whether deploying high performance, shareable, network-attached HSM appliances, host-embedded HSM cards or USB-attached portable HSMs, the Security World architecture provides a unified administrator and user experience and guaranteed interoperability whether the customer deploys one or hundreds of devices.

Watch our interactive demo Explore
Schedule a live demo Schedule
Get in contact with a specialist Contact us