PCIe Data Sheet
PCIe Data Sheet
PCIe Data Sheet
Software functionality
The IBM 4767 adapter
provides three modes of
operation:
- Common Cryptographic
Architecture (CCA) Support
Program (financial transaction
focus),
- IBM Enterprise PKCS #11
(internet business application
focus), and
- Accelerator mode for offload
of computer intensive Referencia 7
operations in clear key mode.
Typical applications
The IBM 4767 PCIe What is a secure HSM?
Cryptographic Coprocessor A secure HSM is a general-purpose computing environment that
(HSM) is suited to applications withstands both physical and logical attacks. The device must run the
requiring high-speed software that it is supposed to run, with confidence that the software has
not been modified. You must be able to (remotely) distinguish between the
cryptographic functions for
real device and application, and a clever impersonator.
data encryption and digital
signing, secure storage of The HSM must remain secure even if adversaries carry out destructive
signing keys, or custom analysis of one or more devices. Many servers operate in distributed
cryptographic applications. environments where it is difficult or impossible to provide complete physical
These can include financial security for sensitive processing. In some applications, the motivated
applications such as PIN adversary is the end user. You need a device that you can trust even
generation and verification in though you cannot control its environment.
automated teller and point-of-
sale transaction servers, key Cryptography is an essential tool in secure processing. When your
management systems, Internet application must communicate with other distributed elements or assert or
business and Web-serving ascertain the validity of data that it is processing, you will find cryptography
applications, Public Key an essential tool.
Infrastructure applications,
smart card applications, PKCS
#11 applications in general, Relevant Cryptographic Standards Supported by the IBM 4767
and custom proprietary FIPS 140 X9.8 / ISO 9564 GBIC (DK)
solutions. Applications can Common Criteria TR-31 NIST SP 800-90A
benefit from the strong security X9.24 Parts 1, 2, and 3 X9.97 / ISO 13491 PKCS #1
characteristics of the HSM and X9.102 PKCS #11
the opportunity to offload
computationally intensive
cryptographic processing.
If you have additional questions about the IBM 4767 or about CCA, please contact [email protected].
The internal environment of the 4767 consists of an embedded Linux operating system and associated device drivers for the
HSM's specialized hardware. IBM provides documented API functions that custom software can use to perform cryptographic
operations or to assist their applications in other ways. Your custom application is digitally signed using a key that you generate
yourself, and the application is securely loaded to the HSM using the same FIPS 140-2 certified processes that are used to protect
IBM-provided HSM code.
Programming custom applications
IBM offers custom programming services through an experienced IBM team that is familiar with the 4767’s specialized
programming environment, tools, debug aids, and code release procedures. Customers can obtain custom programming services
through an experienced IBM services team or through selected contractors. IBM is pleased to jointly develop specifications and
provide quotes on custom solutions.
Education
Courses are held periodically to provide education about the IBM 4767 and CCA. The courses can also be taught at your location,
worldwide. These courses cover programming for the CCA API and the IBM 4767 installation and configuration.
In addition, custom courses can be arranged to cover other topics including programming and debugging applications that operate
within the IBM 4767.
If you have questions about custom applications, the developer’s toolkit, or education, please contact [email protected].
The IBM 4767 is validated by NIST (certificate number 3164) at FIPS 140-2 Level 4, the highest
security level possible.
EP11 in version 4.18 (BSI-DSZ-CC-1002), running on the IBM 4767, has been certified to meet the
requirements of the BSI (Federal Office for Information Security in Germany) for conformance with
Common Criteria in version 3.1 (rev. 4) with Evaluation Assurance Level (EAL) 4.
The evaluation has been conducted in accordance with the provisions of the
certification scheme of the German Federal Office for Information Security
(BSI) and the conclusions of the evaluation facility in the evaluation technical
report are consistent with the evidence adduced.
The IBM 4767-002 with CCA version 5.3 firmware fulfills the security requirements of the German Banking Industry Committee
(GBIC). The report is listed under number 3299.
The HSM IBM Model 4767-002 CCA Release 5.3 implementation is compliant
with GBIC’s security requirements.
Shipping: Card should be shipped in original IBM packaging (electrostatic discharge bag Information concerning non-IBM products was obtained
with desiccant and thermally insulated box with gel packs). from the suppliers of those products. Questions
concerning those products should be directed to those
Temp shipping -34°C to +60°C
suppliers.
Pressure shipping min 550 mbar
Humidity shipping 5% to 100% RH All customer examples described are presented as
illustrations of how those customers have used IBM
Storage: Card should be stored in electrostatic discharge bag with desiccant. products and the results they may have achieved.
Temp storage +1°C to +60°C Actual environmental costs and performance
Pressure storage min 700 mbar characteristics may vary by customer.
Humidity storage 5% to 80% RH
Operation (ambient in system)
Temp operating +10°C to +35°C
Humidity operating 8% to 80% RH
Operating altitude (max) 10 000 ft equivalent to 700 mbar min