Thales TCT Luna Network Hardware Security Module

Luna Network Hardware Security Module (HSM) from Thales Trusted Cyber Technologies (TCT) is the choice for government agencies when generating, storing, protecting and managing cryptographic keys used to secure sensitive data and critical applications. Meeting government mandates for U.S. Supply Chain, the high assurance, tamper-resistant Luna T-Series HSM is designed, developed, manufactured, sold, and supported in the United States.

Luna T-Series models offer secure storage of your cryptographic information in a controlled and highly secure environment. All Luna T-Series models can be initialized by the customer to protect proprietary information by using either multifactor (PED) authentication or password authentication.

INDUSTRY LEADING PERFORMANCE & SECURITY

  • Industry leading cryptographic performance
  • Performance optimized for government mandated algorithms and key lengths
  • Up to 10 times the performance as compared to Luna SA for Government
  • Keys-in-hardware approach protects the entire life-cycle of keys within the FIPS 140-2 validated confines of the HSM
  • Addresses compliance requirements with FIPS 140-2 Level 3 certification
  • Approved by CNSS for use in National Security Systems PKI

UPGRADE DEPLOYED CRYPTOGRAPHIC MODULES

The T-Series of Luna Network HSMs was designed from the ground up as a drop-in replacement for the widely deployed Luna SA for Government HSMs. Using state of the art technology, the Luna Network HSM provides an order of magnitude improved performance compared to the Luna SA for Government while still providing the industry leading security features that government customers have relied on for decades.

QUANTUM ENHANCED KEYS

By embedding a quantum random number generator (QRNG) chip within the Luna HSM, Thales TCT is offering the industry’s first FIPS 140-2 compliant HSM capable of generating quantum enhanced keys. Using principles of quantum physics, the QRNG chip produces high quality entropy which is the basis for all random numbers and cryptographic keys generated by the HSM.  With a choice of operating the HSM in FIPS-approved mode using either the embedded, classic physical RNG or the embedded quantum RNG, customers can dynamically change between classical key generation and quantum enhanced keys as threats emerge over time.

LEARN MORE ABOUT QUANTUM ENHANCED KEYS

Luna Network HSM T-2000 Luna Network HSM T-5000
  • Standard performance
  • 16MB memory
  • 2 partitions, upgradable to 10
  • RSA 2048 1,400 tps
  • RSA 4096 350 tps
  • ECC P-256 3,000 tps
  • ECC P-384 2,000 tps
  • Enterprise-level performance
  • 32 MB memory
  • 5 partitions, upgradable to 20
  • RSA 2048 14,000 tps
  • RSA 4096 3,500 tps
  • ECC P-256 16,000 tps
  • ECC P-384 16,000 tp

EASY TRANSITION FOR DEPLOYED SOLUTIONS

  • Backward compatible with deployed applications
  • Supports previously deployed Luna Clients.
  • Zero changes required to applications integrated with Luna SA for Government
  • Migrate keys from Luna SAs for Government to T-Series HSMs

CRYPTO AGILE

  • Crypto agile architecture supports in-field introduction of new crypto algorithms
  • Large amounts of memory (inside the crypto module) support growth to larger key sizes
  • CPU capabilities support new, compute intensive algorithms and features

BROAD INTEGRATION ECOSYSTEM

  • Large number of integrations with industry-leading technology vendors
  • Documented, out-of-the-box integrations
  • Video tutorials expedite integration tasks

SECURITY FIRST COMPANY

  • Trusted supplier to U.S government for several decades
  • HSM products are U.S designed, developed and manufactured
  • All employees are U.S citizens
  • All office locations in U.S.
  • All support requests answered from U.S. (no outsourcing or foreign call centers)
  • U.S. government approved Trusted Technology Import process
  • Follow security best practices for all product introduction

Cryptography

  • Full support for NSA Commercial National Security Algorithm (CNSA) Suite
  • Support for FIPS-approved and NIST recommended algorithms, modes, curves, and key sizes for RSA, DSA, Diffie-Hellman, AES, SHA-2, SHA-3 and Elliptic Curve Cryptography (ECC)
  • NIST 800-90A compliant Hardware Random Number Generator
    • Classic hardware RNG entropy
    • Quantum RNG entropy
  • Additional non-approved algorithms and key sizes are supported for use with legacy applications
  • Refer to product documentation for complete details

API Support

  • PKCS#11
  • Microsoft CAPI and CNG
  • Java (JCA/JCE)
  • REST
  • Pycryptoki

Supported Operating Systems

  • Windows Server: 2012R2, 2016, 2019
  • Windows 10
  • Linux: RHEL / CentOS7, 8. Ubuntu 18, 20. Oracle Linux 7.9

Security Compliance

  • FIPS 140-2 Level 3
  • Approved by CNSS for use in National Security Systems PKI

Network Interface

  • 4x 1G Ethernet ports
  • Optional 2X 1G and 2X 10G Ethernet ports
  • 10G transceiver: Short Range (SR) Multimode LC connector
  • Port bonding
  • IPv4 and IPv6

Physical Characteristics

  • Standard 1U 19” rack mount chassis
  • Dimensions: 19” x 21” x 1.725” (482.6mm x 533.4mm x 43.815mm)
  • Weight: 28lb (12.7kg)
  • Input Voltage: 100-240V, 50-60Hz
  • Power Consumption: 180W maximum, 84W typical
  • Temperature: operating 0°C – 35°C, storage -20°C – 60°C
  • Relative Humidity: 5% to 95% (38°C) non-condensing

Safety and Environmental Compliance

  • FCC, CE, UL, RoHS, TAA

Reliability

  • Dual hot-swap power supplies
  • Field-serviceable components
  • Mean Time Between Failure (MTBF) 171,308 hrs

Management and Monitoring

  • Remote configuration, administration, and monitoring
  • High-Availability disaster recovery
  • Backup and restore using FIPS 140-2 Level 3 Backup HSM
  • Secure audit logging
  • SNMP monitoring
  • Syslog diagnostics support
ImageTitleLink
Luna Network HSM Product Brief
On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data
White Paper: Roots of Trust
White Paper: Securing Network-Attached HSMs