Security Server

GP HSM Simulator

Utimaco’s GP HSM simulator facilitates evaluation, development and integration testing of a Hardware Security Module without purchase, delivery or installation of hardware.

Try Now
  • Overview
  • Key Features
  • Specifications
  • What’s Included
  • Technology Integrations
  • FAQs

Explore HSM Capabilities with Our Free Simulator

Our free HSM simulator lets you test functionalities, evaluate development processes, and check compatibility with your IT systems. Ideal for integration testing and decision-making. Explore the possibilities of Utimaco’s HSM technology—no costs, no risks.

Try Now
Explore HSM Capabilities
  • Key Features

  • Specifications

  • What’s Included

Cryptographic Interfaces (APIs)
  • Cryptographic Interfaces (APIs)

  • Included Cryptographic algorithms

  • Technology Integrations

Cryptographic Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CAPI), and Cryptography Next Generation (CNG)
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s native Cryptographic eXtended services Interface (CXI C and Java)
image

Included Cryptographic algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • Edwards curves Ed25519 and Ed448
  • AES, Triple-DES, DES
  • MAC, CMAC, HMAC
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator
  • DRBG built on the same standard as the hardware
  • Chinese Algorithms
image

Technology Integrations

  • Public Key Infrastructure: An HSM generates, stores and manages the cryptographic keys used for the certificates in a Public Key Infrastructure. It serves as the root of trust and protects the private keys from being assessed and thus prevents the PKI to be attacked.
  • Digital Signatures: Use the GP HSM simulator to generate public and private key pairs needed to create digital signatures.
  • Privileged Accounts Management: Protect and manage privileged credentials in a secure database. Explore integration with an HSM using our simulator to enhance security by generating and storing sensitive database recovery and server keys directly within the HSM.
  • Encryption: Generate, manage, and store cryptographic keys for encryption and data protection applications using the GP HSM simulator. Test integrations tailored to your specific use case.
image
image
Cryptographic Interfaces (APIs)
  • Product Documentation

  • Simulator Itself

  • Application Programming Interfaces (APIs)

  • Cryptographic Algorithms

  • CAT Administration Utility

Product Documentation

Detailed Product documentation including Quick Start Guides, Administration Guides, documentation on APIs, error references, and product details.

image

Simulator Itself

The GP HSM simulator is a simulator of our GP HSM firmware SecurityServer. It is an an executable program with an installer, available in the Utimaco download portal.

image

Application Programming Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CAPI), and Cryptography Next Generation (CNG)
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s native Cryptographic eXtended services Interface (CXI C and Java)
image

Cryptographic Algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • Edwards curves Ed25519 and Ed448
  • AES, Triple-DES, DES
  • MAC, CMAC, HMAC
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator
  • DRBG built on the same standard as the hardware
  • Chinese Algorithms
image

CAT Administration Utility

With the PKCS #11 CAT – CryptoServer Administration Tool users can manage keys via PKCS #11 on a graphical interface for testing purposes.

image
image

Technology Integrations

An HSM’s purpose is to serve applications with secure cryptographic processing and key management. Therefore, integration with third party applications is crucial for the ecosystem.

Thanks to Utimaco’s simulator, these integrations are much easier and quicker compared to use of real hardware.


Frequently Asked Questions

How do I access the GP HSM simulator?

To access the Utimaco SecurityServer simulator, you have to create an account on the Utimaco portal. After registration, we will have to verify your provided information for export compliance reasons – this verification process can take up to 48 hours. Then you will be granted access to the Utimaco download portal. Got to the section simulators and choose the SecurityServer Simulator for download.

Can I transfer the setup from the simulator to a real Utimaco Hardware Security Module?

Yes! With the GP HSM simulator, you can configure and test your integrations or applications, then seamlessly transfer the setup to your Utimaco Hardware Security Module. This accelerates project evaluation by allowing you to start work even before the actual HSM is installed. However, for security reasons, please make sure not to use any test key materials with the actual HSM.

Can the GP HSM simulator replace a real Hardware Security Module?

No. While the GP HSM simulator is a valuable tool to test functionalities, integration capabilities, and custom developments, it does not provide the security level of a real Hardware Security Module.

Where can I find help with using the simulator?

The download package includes product documentation, and a quick start guide to assist you. For additional support, feel free to contact us at: support@utimaco.com

Are there simulators available for specific algorithms like blockchain or PQC?

Yes, Utimaco offers simulators for all application packages of the u.trust General Purpose HSM Se-Series. Dedicated simulators are available for blockchain, 5G, and Post Quantum Cryptography algorithms.

Ready to Secure Your Digital Future?

Contact Sales

Related Products