본문 바로가기
리뷰s

SafeNet eToken 5110

by Joseph.Lee 2019. 8. 14.

RSA는 1024 ~ 2048bit, EC는 256~384bit까지만 지원한다.

>pkcs11-tool.exe --module eTPKCS11.dll -M
Using slot 0 with a present token (0x0)
Supported mechanisms:
  DES-MAC, keySize={8,8}, sign, verify
  DES-MAC-GENERAL, keySize={8,8}, sign, verify
  DES3-MAC, keySize={24,24}, sign, verify
  DES3-MAC-GENERAL, keySize={24,24}, sign, verify
  AES-MAC, keySize={16,32}, sign, verify
  AES-MAC-GENERAL, keySize={16,32}, sign, verify
  RC4, keySize={8,128}, encrypt, decrypt
  DES-ECB, keySize={8,8}, encrypt, decrypt, wrap, unwrap
  DES-CBC, keySize={8,8}, encrypt, decrypt, wrap, unwrap
  DES-CBC-PAD, keySize={8,8}, encrypt, decrypt, wrap, unwrap
  DES3-ECB, keySize={24,24}, hw, encrypt, decrypt, wrap, unwrap
  DES3-CBC, keySize={24,24}, hw, encrypt, decrypt, wrap, unwrap
  DES3-CBC-PAD, keySize={24,24}, hw, encrypt, decrypt, wrap, unwrap
  AES-ECB, keySize={16,32}, hw, encrypt, decrypt, wrap, unwrap
  AES-CBC, keySize={16,32}, hw, encrypt, decrypt, wrap, unwrap
  AES-CBC-PAD, keySize={16,32}, hw, encrypt, decrypt, wrap, unwrap
  mechtype-0x1086, keySize={16,32}, hw, encrypt, decrypt, wrap, unwrap
  mechtype-0x1088, keySize={16,32}, hw, encrypt, decrypt, wrap, unwrap
  RSA-PKCS-KEY-PAIR-GEN, keySize={1024,2048}, hw, generate_key_pair
  RSA-PKCS, keySize={1024,2048}, hw, encrypt, decrypt, sign, sign_recover, verify, verify_recover, wrap, unwrap
  RSA-PKCS-OAEP, keySize={1024,2048}, hw, encrypt, decrypt, wrap, unwrap
  RSA-PKCS-PSS, keySize={1024,2048}, hw, sign, verify
  SHA1-RSA-PKCS-PSS, keySize={1024,2048}, hw, sign, verify
  SHA256-RSA-PKCS-PSS, keySize={1024,2048}, hw, sign, verify
  SHA384-RSA-PKCS-PSS, keySize={1024,2048}, hw, sign, verify
  SHA512-RSA-PKCS-PSS, keySize={1024,2048}, hw, sign, verify
  MD5-RSA-PKCS, keySize={1024,2048}, hw, sign, verify
  SHA1-RSA-PKCS, keySize={1024,2048}, hw, sign, verify
  SHA256-RSA-PKCS, keySize={1024,2048}, hw, sign, verify
  SHA384-RSA-PKCS, keySize={1024,2048}, hw, sign, verify
  SHA512-RSA-PKCS, keySize={1024,2048}, hw, sign, verify
  ECDSA-KEY-PAIR-GEN, keySize={256,384}, hw, generate_key_pair, other flags=0xd00000
  ECDSA, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  ECDSA-SHA1, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  ECDSA-SHA256, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  ECDSA-SHA384, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  mechtype-0x80000045, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  ECDSA-SHA512, keySize={256,384}, hw, sign, verify, other flags=0xd00000
  ECDH1-DERIVE, keySize={256,384}, hw, derive, other flags=0xd00000
  RC4-KEY-GEN, keySize={8,128}, generate
  DES-KEY-GEN, keySize={8,8}, generate
  DES2-KEY-GEN, keySize={16,16}, generate
  DES3-KEY-GEN, keySize={24,24}, generate
  AES-KEY-GEN, keySize={16,32}, generate
  PBE-SHA1-RC4-128, keySize={128,128}, generate
  PBE-SHA1-RC4-40, keySize={40,40}, generate
  PBE-SHA1-DES3-EDE-CBC, keySize={24,24}, generate
  PBE-SHA1-DES2-EDE-CBC, keySize={16,16}, generate
  GENERIC-SECRET-KEY-GEN, keySize={8,2048}, hw, generate
  PBA-SHA1-WITH-SHA1-HMAC, keySize={160,160}, hw, generate
  PBE-MD5-DES-CBC, keySize={8,8}, generate
  PKCS5-PBKD2, generate
  MD5-HMAC-GENERAL, keySize={8,2048}, sign, verify
  MD5-HMAC, keySize={8,2048}, sign, verify
  SHA-1-HMAC-GENERAL, keySize={8,2048}, sign, verify
  SHA-1-HMAC, keySize={8,2048}, sign, verify
  mechtype-0x252, keySize={8,2048}, sign, verify
  SHA256-HMAC, keySize={8,2048}, sign, verify
  mechtype-0x262, keySize={8,2048}, sign, verify
  SHA384-HMAC, keySize={8,2048}, sign, verify
  mechtype-0x272, keySize={8,2048}, sign, verify
  SHA512-HMAC, keySize={8,2048}, sign, verify
  MD5, digest
  SHA-1, digest
  SHA256, digest
  SHA384, digest
  SHA512, digest
  mechtype-0x80006001, keySize={24,24}, generate

 

1024bit는 Smartcard HSM 보다 느리지만 2048bit는 Smartcard HSM보다 빠르다.

2048bit기준 SmartcardHSM은 20여초, eToken은 15초 정도이다.

Days              : 0
Hours             : 0
Minutes           : 0
Seconds           : 6
Milliseconds      : 902
Ticks             : 69027467
TotalDays         : 7.98929016203704E-05
TotalHours        : 0.00191742963888889
TotalMinutes      : 0.115045778333333
TotalSeconds      : 6.9027467
TotalMilliseconds : 6902.7467




C:\Program Files\OpenSC Project\OpenSC\tools>powershell "Measure-Command{.\pkcs11-tool --module eTPKCS11.dll -l -p "P@ssw0rd" --keypairgen --key-type rsa:2048 --id 11}"
Using slot 0 with a present token (0x0)


Days              : 0
Hours             : 0
Minutes           : 0
Seconds           : 15
Milliseconds      : 34
Ticks             : 150344055
TotalDays         : 0.000174009322916667
TotalHours        : 0.00417622375
TotalMinutes      : 0.250573425
TotalSeconds      : 15.0344055
TotalMilliseconds : 15034.4055

C:\Program Files\OpenSC Project\OpenSC\tools>powershell "Measure-Command{.\pkcs11-tool --module eTPKCS11.dll -l -p "P@ssw0rd" --keypairgen --key-type EC:prime256v1 --id 13}"
Using slot 0 with a present token (0x0)


Days              : 0
Hours             : 0
Minutes           : 0
Seconds           : 4
Milliseconds      : 282
Ticks             : 42824181
TotalDays         : 4.95650243055556E-05
TotalHours        : 0.00118956058333333
TotalMinutes      : 0.071373635
TotalSeconds      : 4.2824181
TotalMilliseconds : 4282.4181




C:\Program Files\OpenSC Project\OpenSC\tools>powershell "Measure-Command{.\pkcs11-tool --module eTPKCS11.dll -l -p "P@ssw0rd" --keypairgen --key-type EC:secp384r1 --id 14}"
Using slot 0 with a present token (0x0)


Days              : 0
Hours             : 0
Minutes           : 0
Seconds           : 4
Milliseconds      : 175
Ticks             : 41751352
TotalDays         : 4.83233240740741E-05
TotalHours        : 0.00115975977777778
TotalMinutes      : 0.0695855866666667
TotalSeconds      : 4.1751352
TotalMilliseconds : 4175.1352
반응형

댓글