All Products
Search
Document Center

Key Management Service:Specifications and performance of dedicated HSM

Last Updated:Mar 31, 2026

This page lists the interface specifications, supported encryption algorithms, and performance data for each dedicated Hardware Security Module (HSM) type available in Alibaba Cloud KMS.

HSM comparison

The following table summarizes key differences between the two dedicated HSM types to help you select the right model.

AttributeThales HSMTASS Crypto Engine HSM
CompliancePCI DSS, FIPS 140-2 Level 3, PCI PIN, domestic cryptographic certificationFIPS 140-2 Level 3, Chinese national cryptography law
Chinese cryptographic algorithmsNot specifiedSM2, SM3, SM4
Interface standardsNot specifiedGM/T 0018-2012, PKCS#11, SunJCE
LMK quota1–20 (expandable via license)
CPS quota25–10,000 (expandable via license)

Thales HSM

A Thales HSM is a physical cryptographic device that protects sensitive data through hardware-enforced encryption and access control.

FeatureDetails
Compliance standardsPCI DSS, FIPS 140-2 Level 3, PCI PIN, and domestic cryptographic certification
Local Master Key (LMK) quota1–20 (expandable via license upgrade)
Calls Per Second (CPS) quota25–10,000 (expandable via license upgrade)
Note

CPS measures the HSM's maximum throughput for key block-related commands (such as PIN translation) in secure communication scenarios. Different commands have different maximum CPS values. Time-consuming operations — including RSA key generation and message authentication code, hash, encryption, and decryption calculations over large data volumes — are not covered by the CPS metric.

TASS Crypto Engine HSM

A TASS Crypto Engine HSM is a secure hardware device that delivers cryptographic services at the application layer through a dedicated key management system and an integrated encryption workflow. It supports key management, message authentication, data encryption and decryption, and digital signature generation and verification.

In addition to FIPS 140-2 Level 3 compliance, the TASS Crypto Engine HSM supports Chinese cryptographic algorithms (SM2, SM3, SM4) in alignment with national cryptography law.

Interface specifications

SpecificationDescription
GM/T 0018-2012Cryptographic device application interface specification (Chinese national standard)
PKCS#11Cryptographic token interface standard
SunJCEJava Cryptography Extension interface

Supported algorithms

Algorithm typeAlgorithms
Symmetric encryptionSM4, DES, 3DES, AES (128-bit and 256-bit keys)
Asymmetric encryptionSM2, RSA (2,048–4,096 bits), Elliptic Curve Cryptography (ECC): NIST P256, BRAINPOOLP256, FRP256, and more
HashSM3, SHA1, SHA256, SHA384, SHA512

Performance data

The following performance figures are measured under these test conditions: 32-byte test data, TCP/IP data communication protocol, maximum 2,048 concurrent connections.

Note

Actual performance varies based on data size, concurrent connection count, and application load. Run load tests against your specific workload to determine scaling needs.

OperationThroughputResponse time
AES128 encryption100,000 QPS0.007 s
AES256 encryption100,000 QPS0.007 s
RSA2048 key generation40 pairs/s1.003 s
RSA2048 public key operation40,000 QPS0.008 s
RSA2048 private key operation4,000 QPS0.018 s
SM3 hashing100,000 QPS0.007 s
SM4 encryption100,000 QPS0.009 s
SM2 key generation45,000 QPS0.004 s
SM2 signing45,000 QPS0.003 s
SM2 signature verification20,000 QPS0.006 s

QPS = queries per second.