Skip Navigation

Luna PCIe Hardware Security Module (HSM) from Thales Trusted Cyber Technologies (TCT) is the choice for government agencies when generating, storing, protecting and managing cryptographic keys used to secure sensitive data and critical applications. Meeting government mandates for U.S. Supply Chain, the high assurance, tamper-resistant Luna T-Series HSM is designed, developed, manufactured, sold, and supported in the United States exclusively by Thales Trusted Cyber Technologies.

Luna T-Series models offer secure storage of your cryptographic information in a controlled and highly secure environment. All Luna T-Series models can be initialized by the customer to protect proprietary information by using either multifactor (PED) authentication or password authentication. 

Industry Leading Performance & Security

  • Industry leading cryptographic performance
  • Performance optimized for government mandated algorithms and key lengths
  • Up to 10 times the performance as compared to Luna PCIe for Government
  • Keys-in-hardware approach protects the entire life-cycle of keys within the FIPS 140-2 validated confines of the HSM
  • Addresses compliance requirements with FIPS 140-2 Level 3 certification 
  • Approved by CNSS for use in National Security Systems PKI

Upgrade Deployed Cryptographic Modules

The T-Series of Luna PCIe HSMs was designed from the ground up as a drop-in replacement for the widely deployed Luna PCIe for Government HSMs. Using state of the art technology, the Luna PCIe HSM provides an order of magnitude improved performance compared to the Luna PCIe for Government while still providing the industry leading security features that government customers have relied on for decades.

Quantum Enhanced Keys

By embedding a quantum random number generator (QRNG) chip within the Luna HSM, Thales TCT is offering the industry’s first FIPS 140-2 compliant HSM capable of generating quantum enhanced keys. Using principles of quantum physics, the QRNG chip produces high quality entropy which is the basis for all random numbers and cryptographic keys generated by the HSM.  With a choice of operating the HSM in FIPS-approved mode using either the embedded, classic physical RNG or the embedded quantum RNG, customers can dynamically change between classical key generation and quantum enhanced keys as threats emerge over time.

Learn more about Quantum Enhanced Keys


  • Available Models
    Luna PCIe HSM T-2000 Luna PCIe HSM T-5000
    • Standard performance
    • 16MB memory
    • RSA 2048 1,400 tps
    • RSA 4096 350 tps
    • ECC P-256 3,000 tps
    • ECC P-384 2,000 tps
    • Enterprise-level performance
    • 32 MB memory
    • RSA 2048 14,000 tps
    • RSA 4096 3,500 tps
    • ECC P-256 16,000 tps
    • ECC P-384 16,000 tps
  • Features and Benefits

    Easy transition for deployed solutions

    • Backward compatible with deployed applications
    • Zero changes required to applications integrated with Luna PCIe for Government
    • Migrate keys from Luna PCIe for Government to T-Series HSM

    Crypto Agile

    • Crypto agile architecture supports in-field introduction of new crypto algorithms
    • Large amounts of memory (inside the crypto module) support growth to larger key sizes
    • CPU capabilities support new, compute intensive algorithms and features

    Broad Integration Ecosystem

    • Large number of integrations with industry-leading technology vendors
    • Documented, out-of-the-box integrations
    • Video tutorials expedite integration tasks

    Security First Company

    • Trusted supplier to U.S government for several decades
    • HSM products are U.S designed, developed and manufactured
    • All employees are U.S citizens
    • All office locations in U.S.
    • All support requests answered from U.S. (no outsourcing or foreign call centers)
    • U.S. government approved Trusted Technology Import process
    • Follow security best practices for all product introduction
  • Technical Specifications


    • Full support for NSA Commercial National Security Algorithm (CNSA) Suite
    • Support for FIPS-approved and NIST recommended algorithms, modes, curves, and key sizes for RSA, DSA, Diffie-Hellman, AES, SHA-2, SHA-3 and Elliptic Curve Cryptography (ECC)
    • NIST 800-90A compliant Hardware Random Number Generator
      • Classic hardware RNG entropy 
      • Quantum RNG entropy
    • Additional non-approved algorithms and key sizes are supported for use with legacy applications
    • Refer to product documentation for complete details

    API Support

    • PKCS#11
    • Microsoft CAPI and CNG
    • Java (JCA/JCE)
    • Pycryptoki

    Supported Operating Systems

    • Windows Server: 2012R2, 2016, 2019
    • Windows 10
    • Linux: RHEL / CentOS 7, 8. Ubuntu 18, 20. Oracle Linux 7.9

    Security Compliance

    • FIPS 140-2 Level 3 
    • Approved by CNSS for use in National Security Systems PKI

    Physical Characteristics

    • Dimensions: Full Height, Half Length 4.2”x6.6”
    • Weight: 300gm (10.6oz)
    • Host Interface: PCIe Gen 2 x4
    • Power Consumption: 20W maximum, 10W typical
    • Temperature: operating 0°C – 50°C, storage -20°C – 60°C

    Safety and Environmental Compliance

    • FCC


    • Mean Time Between Failure (MTBF) 250,821 hrs
  • Resources

    Luna PCIe HSM Product Brief
    Product overview with technical features and specifications.

    Download Now


    Thales TCT Luna HSM Family Brochure
    Product family overview with technical features and specifications.

    Download Now

    Building a Root of Trust to Secure Your Cloud & Digital Transformation
    During this webinar attendees learned to implement a strong root of trust to secure the most sensitive data.

    Download Now

    Roots of Trust: Five Things You Must Know
    The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptographic controls? Modern computer systems are incredibly powerful and flexible. They can be molded to accomplish things that were unimaginable a mere decade ago. This same property makes them almost impossible to control and all too easy for malicious actors to find ways to disrupt them. To counter these threats, security experts have resorted to a wide range of cryptographic tools, and for these tools to function they need a trust worthy beginning.

    Download Now

    Best Practices for Cryptographic Key Management
    Once data is encrypted, the only way to gain access is by decrypting or unlocking secret content using the key. Haphazardly protecting these keys negates the entire process of encryption and creates a false sense of security. This white paper outlines best practices for deploying an effective cryptographic key management strategy.

    Download Now

    Securing Network-Attached HSMs - Three-Layer Authentication Model
    The Luna SA for Government uses a comprehensive three-layer authentication and access control model to achieve extremely strong security between the host application processes and the Luna SA for Government’s HSM partitions.This three-layer authentication and access control model was designed to allow the Luna SA for Government to offer network connectivity to clients without sacrificing the security requirements of HSM operations.

    Download Now

    How-To Video Series
    See how our solutions work in live environments. Our How-to Video series will demonstrate how to install, integrate and use our solutions in your network.


This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.