HSM stands for Hardware Security Module and is an incredibly secure physical device specifically designed and used for crypto processing and strong authentication. It can encrypt, decrypt, create, store and manage digital keys, and be used for signing and authentication. The purpose is to safeguard and protect keys.
MOSIP highly recommends the following specifications for HSM:
Must support cryptographic offloading and acceleration.
Should provide Authenticated multi-role access control.
Must have strong separation of administration and operator roles.
Capability to support client authentication.
Must have secure key wrapping, backup, replication and recovery.
Must support 2048, 4096 bit RSA Private Keys, 256 bit AES keys on FIPS 140-2 Level 3 Certified Memory of Cryptographic Module.
Must support at least 10000+ 2048 RSA Private Keys on FIPS 140-2 Level 3 Certified Memory of Cryptographic Module.
Must support clustering and load balancing.
Should support cryptographic separation of application keys using logical Partitions.
Must support M of N multi-factor authentication.
PKCS#11, OpenSSL, Java (JCE), Microsoft CAPI and CNG.
Minimum Dual Gigabit Ethernet ports (to service two network segments) and 10G Fibre port should be available.
Asymmetric public key algorithms: RSA, DiffieHellman, DSA, KCDSA, ECDSA, ECDH, ECIES.
Symmetric algorithms: AES, ARIA, CAST, HMAC, SEED, Triple DES, DUKPT, BIP32.
Hash/message digest: SHA-1, SHA-2 (224, 256, 384, 512 bit).
Full Suite B implementation with fully licensed ECC including Brainpool, custom curves and safe curves.
Safety and environmental compliance
Compliance to UL, CE, FCC part 15 class B.
Compliance to RoHS2, WEEE.
Management and monitoring
Support Remote Administration —including adding applications, updating firmware, and checking the status— from NoC.
Syslog diagnostics support.
Command line interface (CLI)/graphical user interface (GUI).
Support SNMP monitoring agent.
Standard 1U 19in. rack mount with integrated PIN ENTRY Device.
RSA 2048 Signing performance – 10000 per second.
RSA 2048 Key generation performance – 10+ per second.
RSA 2048 encryption/decryption performance - 20000+.
RSA 4096 Signing performance - 5000 per second.
RSA 4096 Key generation performance - 2+ per second.
RSA 4096 encryption/decryption performance - 20000+.
Should have the ability to backup keys, replicate keys, store keys in offline locker facilities for DR. The total capacity is inline with the total number of keys prescribed.
Clustering minimum of 20 HSMs.
Less than 30 seconds for key replication across the cluster.
A minimum of 30 logical partitions and their license should be included in the cost.