Entrust nShield Solo XC/5s

The Entrust nShield Solo module and its latest version Entrust nShield 5s are not only high-end products providing secure storage of cryptographic keys. It is also a unique Security World secure environment based on hardware and software security – a complete solution for cryptographic key management.

The module comes with a software package that includes, among others, the KeySafe application, which, using a graphical interface, allows efficient management of the environment. The Security World environment integrates smoothly with existing PKI systems, and additional development tools allow you to create your own applications using the advantages of the nShield module. Key management mechanisms are complemented with functions for accelerating cryptographic operations.



Due to its versatile nature and compliance with public key infrastructure standards, nShield is used in many security-related sectors of the IT industry, from complex PKI environments to secure database access systems to solutions designed for high-speed processing of SSL/TLS layer operations. Entrust offers the nShield Solo XC and 5s module with PCI Express connector, the most powerful device in the 5s series is the nShield 5s High model, which performs up to 13614 operations on a 2048-bit private key, while the nShield Solo XC High model performs 3600 such operations.

Both versions of the nShield model will allow efficient generation and use of keys for elliptic curve based (ECC) algorithms.



Performance is measured in transactions/signatures per second (TPS)

RSA performanceBaseMidHigh
Solo XC430 - 2048 bit
100 - 4096 bit
3500 - 2048 bit
850 - 4096 bit
8600 - 2048 bit
2025 - 4096 bit
5s670 - 2048 bit
135 - 4096 bit
19 - 8192 bit
3949 - 2048 bit
814 - 4096 bit
115 - 8192 bit
13614 - 2048 bit
2200 - 4096 bit
309 - 8192 bit
Note: performance may depend on the operating system, applications and other factors.
Supported cryptographic algorithms
Symmetric algorithmsAES, Arcfour, ARIA, Camellia, MD5 HMAC, RIPEMD160 HMAC, SEED, SHA-1 HMAC, SHA-224 HMAC, SHA-256 HMAC, SHA-384 HMAC, SHA-512 HMAC, Tiger HMAC, 3DES
Asymmetric algorithmsRSA, Diffie-Hellman, ECMQV, DSA, El-Gamal, KCDSA, ECDSA, ECDH, Edwards (X25519, Ed25519ph)
HASH algorithmsXC: MD5, SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160, RIPEMD160
5s: MD5, SHA-1, SHA-2 (224, 256, 384, 512 bit), HAS-160, RIPEMD160, SHA-3 (224, 256, 384, 512 bit)
Technical specification
Supported OS*Windows, Linux operating systems including distributions from Red Hat, SUSE
Solo XC virtual environments supported including VMware ESX, Microsoft Hyper-V, Linux KVM, Citrix XenServer
Open SSL
Java (JCE)
Microsoft CAPI and CNG
Web Services
Certifications &Compliances (depends on model type)Solo XC:FIPS 140-2 level 2 and level 3
5s:FIPS 140-3 level 3 - pending,
Common Criteria EAL4+
* Contact us in order to obtain detailed information regarding support for a specific OS version.