The Luna G5 for Government is a small form factor HSM that is widely used by government agencies for data, applications and digital identities to reduce risk and ensure regulatory compliance. Derived from industry-leading technology, the FIPS 140-2 certified Luna G5 for Government is manufactured, sold, and supported exclusively by Thales TCT.
Luna G5 for Government delivers industry leading key management in a small and portable form factor. All key material is maintained exclusively within the confines of the hardware. The small form-factor and offline key storage capability sets the product apart, making it especially attractive to customers with business critical keys that need to physically detach and store the HSM in a secure offline environment.
Tamper Recovery Role
The Luna G5 for Government features sophisticated tamper detection and response circuitry to automatically zeroize internal keys in the event of an attempted attack on the HSM. Balancing this extreme security posture with end user ease of use concerns, the Luna G5 for Government includes a capability for properly authenticated security officers to recover from an inadvertent tamper event and quickly put the HSM back into its usable state without the loss of any keys or sensitive data.
Secure Transport Mode
The G5 tamper response circuits have also allowed the introduction of a secure transport mode. Security Officers use the device’s tamper recovery role keys to cryptographically lock down the HSM prior to transporting the device.
Luna G5 for Government supports a broad range of asymmetric key encryption and key exchange capabilities, as well as support for all standard symmetric encryption algorithms. It also supports all standard hashing algorithms and message authentication codes (MAC). The Luna G5 for Government also supports ECC key pairs for use in Suite B applications that require a permanent, factory generated digital ID.
Luna G5 for Government Performance and Scalability
• RSA-1024 200 tps
• RSA-2048 63 tps
• ECC P256 43 tps
• AES-GCM 71 tps
Safety and Environmental Compliance
|Luna G5 for Government Product Brief
Product overview with technical features and specifications.
|Roots of Trust: Five Things You Must Know
The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptographic controls? Modern computer systems are incredibly powerful and flexible. They can be molded to accomplish things that were unimaginable a mere decade ago. This same property makes them almost impossible to control and all too easy for malicious actors to find ways to disrupt them. To counter these threats, security experts have resorted to a wide range of cryptographic tools, and for these tools to function they need a trust worthy beginning.
|Best Practices for Cryptographic Key Management
Once data is encrypted, the only way to gain access is by decrypting or unlocking secret content using the key. Haphazardly protecting these keys negates the entire process of encryption and creates a false sense of security. This white paper outlines best practices for deploying an effective cryptographic key management strategy.