nShield Edge HSMs

nShield Edge hardware security modules (HSMs) are USB-connected desktop devices that provide convenience and economy for environments requiring low-volume cryptographic key services

nShield Edge HSMs

The nShield Edge USB hardware security module is a full-featured, portable USB HSM designed for low-volume transaction environments. This HSM is a USB-connected device that delivers capabilities for encryption and key protection, and is ideally suited for off-line key generation for certificate authorities (CAs) as well as development environments.

Ideal for low-volume transaction environments

Because the USB hardware security module connects via a USB port, the nShield Edge hardware security module suits off-line key generation and development environments, while delivering complete algorithm and API support.

Highly portable

The USB HSM has a small, lightweight design with convenient USB interface that supports a wide variety of host platforms, including laptops and other portable devices.

Cost effective

The most economical USB HSM in the nShield family, nShield Edge gives you an entry-point HSMs, while letting you scale your environment with other nShield models as needed.

Certified hardware solutions

nCipher has earned a broad set of certifications for nShield products. These certifications help our customers to demonstrate compliance while also giving them the assurance that their nShield HSMs meet stringent industry standards.

nShield Edge USB hardware security modules (USB HSMs) are certified to FIPS 140-2 Level 2 and Level 3.

Safety and environmental standards compliance:

  • UL, CE, FCC, C-TICK, Canada ICES
  • RoHS2, WEEE
Wide support for APIs and cryptographic algorithms

Supported APIs

  • PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG

Supported Cryptographic Algorithms

  • Asymmetric public key algorithms: RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
  • Symmetric algorithms: AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED, Triple DES
  • Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160
  • Full Suite B implementation with fully licensed ECC, including Brainpool and custom curves

nShield HSMs offers the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

Operating Systems

  • Microsoft Windows 7 x64, 10 x64, Windows Server 2008 R2 x64, 2012 R2 x64, 2016 x64
  • Red Hat Enterprise Linux AS/ES 6 x64, x86, 7 x64; SUSE Enterprise Linux 11 x64 SP2, 12 x64
  • Oracle Enterprise Linux 6.8 x64, 7.1 x64
CipherTools Developer Toolkit

The CipherTools Developer Toolkit is a set of tutorials, reference documentation, sample programs and additional libraries. With this toolkit, developers can take full advantage of the advanced integration capabilities of nShield HSMs. In addition to offering support for standard APIs, the toolkit enables you to run custom applications with nShield HSMs.

Elliptic Curve Cryptography (ECC) activation

The ECC activation license enables EC-DH, EC-DSA and EC-MQV to be used on an nShield HSMs.

KCDSA activation

With the KCDSA activation license, you can use the Korean Certificate-based Digital Signature Algorithm (KCSDA) as well as HAS-160, SEED and ARIA algorithms on an nShield HSMs.

FIPS certification options

The nShield Edge is available in FIPS 140-2 Level 2 and Level 3 variants. A non-FIPS developer edition is also offered.

White Paper : The nCipher Security World Architecture

The nCipher Security World architecture supports a specialized key management framework that spans the entire nShield family of general purpose hardware security modules (HSMs). Whether deploying high performance, shareable, network-attached HSM appliances, host-embedded HSM cards or USB-attached portable HSMs, the Security World architecture provides a unified administrator and user experience and guaranteed interoperability whether the customer deploys one or hundreds of devices.


White Paper : Key Isolation for Enterprises and Managed Service Providers

It is vital for any business that relies on cryptographic keys to have assurances and enforceable policies around key usage. The nShield family of Hardware Security Modules (HSMs) provides that assurance. The Security World key management framework, supported by the nShield HSMs family, enables organizations to create a structured key infrastructure that meets today’s dynamic and fluid requirements.

This paper demonstrates how it is possible to easily configure Security World to define a framework which permits both partitioning and multi-tenancy cryptographic key isolation strategies.


Data Sheet : nShield Monitor

nShield Monitor is a tool that lets you monitor, 24x7 and in one centralized location, all your nCipher HSMs.


Data Sheet : Web Services Option Pack

Reduce integration and gain simplicity using this API, providing a simple interface between cloud, data center or on-premises applications and nShield crypto services.

Want to be part of our team? Explore
Get in contact with a specialist Contact Us