Products |  Endpoint Security Modules

Security UKEY

Overview:

C*Core’s security UKEY is a multi-functional and versatile UKEY designed based on the  C*Core’s security chip. It supports various operating systems such as Windows and Linux,and features   symmetric encryption algorithms such as DES, AES, SM4.It also supports asymmetric algorithms like ECC (SM2), ,as well as the SHA,(SM3) hash algorithms. The UKEY can be widely used in applications such as PKI authentication, digital signatures, and real-time data encryption/ decryption.


Performance Indicators



ParameterDescription

Processor

C*Core’s 32-bit RISC chip

Communication Protocol

USB3.0 standard protocol

EFLASH

Available capacity of 128KB

Operating Temperature

Commercial grade: 0℃~70℃   Industrial grade: -40℃~85℃

Operating Voltage

5V

Reliability

7*24H

Power Consumption

Static: <30mA, Operating: <50mA

Middleware

Supporting the "Smart Card and Smart Token Cryptography Application Interface Specification" issued by the State Cryptography Administration

Algorithm Support

SM4/DES/AES/RSA/SM2/SM3/SHA

SM2 signature

100times /s

SM2 Verification

80times /s

SM2 Key Pair Generation

50times /s

RSA1024 signature

48times /s

RSA1024 Verification

1150times /s

RSA1024 Key Pair Generation

3times /s

RSA2048 Signiture

6times /s

RSA2048 Verification

500times /s

RSA2048 Key Pair Generation

0.4times /s

SM1 Encryption and Decryption

75Mbps

SM4 Encryption and Decryption

75Mbps

DES Encryption and Decryption

75Mbps

AES Encryption and Decryption

75Mbps

SM3 Hashing Operationv

90Mbps




Physical Dimensions:

UDP Version

The standard dimensions for UDP package are 24.811.41.4mm, as shown in the figure:




MUDP Version

The standard dimensions for MUDP packaging are 1511.41.4mm,as shown in the figure:



Finished Product

The dimensions of the assembled casing for both UDP and MUDP are 39.412.24.55mm, as shown in the figure:




Functional Characteristics

• Based on a domestic 32-bit RISC chip.

• Supporting USB 2.0 high-speed communication interface.

• Supporting hardware-accelerated for DES, AES, and Chinese Commercial Cryptography symmetric algorithms of SM4.

• Supporting hardware-accelerated for SHA1, SHA256, and Chinese Commercial Cryptography SM3 hashing algorithms.

• Equipped with an asymmetric algorithm hardware accelerator, supporting RSA, ECC, and Chinese Commercial Cryptography SM2 asymmetric algorithms.

• Supporting high-speed DMA data transmission.

• The on-chip MPU enables the encryption and protection of internally stored sensitive data.

• Hardware random number generator for generating true random numbers.

Product Qualification

• Level II of crypto module for commercial crypto product certification。

Typical Application

• Online banking

• File encryption

• Certificate Authority

• E-government affairs

• Copyright control

• Secure office

• Secure email

Technical Support

• Complete development environment

• Rich driver library

• Complete application solutions

Explore More