This topic describes one type of Virtual Security Module (VSM) that is supported by Cloud Hardware Security Module, General Virtual Security Modules (GVSMs), including API specifications, encryption algorithms, and performance references.
HSMs in the Chinese mainland
GVSMs (validated by the State Cryptography Administration)
The GVSM complies with GM/T 0028-2014 security technical requirements for cryptographic modules and GM/T 0030-2014 cryptographic server technical specification. It provides internationally standardized cryptographic service interfaces and supports Public Key Infrastructure (PKI) applications using Chinese cryptographic algorithms (GM/T series). The GVSM enables independent or concurrent delivery of cryptographic operations and key management services to multiple applications. GVSM supports dedicated or parallel cryptographic operation and key management for multiple applications.
Feature | Description |
Interface specifications |
|
Encryption algorithms |
|
Data communication protocol | TCP/IP. |
Maximum concurrent connections | 256 |
Performance with 32-byte test data
Performance reference | Operations per second | Response time (unit: seconds) |
SM1 encryption performance | 600 | 0.006 |
SM2 key generation performance | 4,000 | 0.006 |
SM2 signing performance | 3,000 | 0.008 |
SM2 verification performance | 2,000 | 0.026 |
RSA2048 key generation performance | 6 pairs per second | 8.605 |
SA2048 public key operations | 3,500 | 0.008 |
RSA2048 private key operations | 400 | 0.018 |
SM3 digest performance | 5,000 | 0.009 |
SM4 encryption performance | 5,000 | 0.003 |
AES128 performance | 7,000 | 0.004 |
AES256 performance | 6,000 | 0.004 |
HSMs outside the Chinese mainland
GVSMs (validated by NIST FIPS 140-2 Level 3)
The hardware and firmware of the GVSM comply with FIPS 140-2 Level 3 certification. You can securely and reliably manage cryptographic keys while using various encryption algorithms to perform robust encryption and decryption operations on data.
Feature | Description |
Interface specifications | PKCS#11 interface specification. |
Encryption algorithms |
|
Performance references |
|
Limits |
|