CryptoServer CP5
The Hardware Security Module for highest physical security requirements

CryptoServer General Purpose HSM CSe-Series

Hardware Security Module for high-security environments

The CryptoServer General Purpose HSM is designed to meet the most highest physical security requirements. Specifically designed for sensitive and critical applications prevalent in banking and government environments, its advanced sensor mechanism, which includes a sensor protection film, reacts to all types of mechanical, chemical, and physical threats. In the event of an attack, sensitive keys and data stored within the HSM’s internal memory are actively and quickly erased. This mechanism meets the requirements of FIPS 140-2 highest level 4 in the area of "physical security" and is certified according to this security standard.

Produkttyp:

Platform

Unterstützte Firmwares:

Lieferzeit:

Fragen Sie unser Vertriebsteam
Key Features

Key Features

Icon

FIPS certified up to 140-2 Level 4 (Physical Security)

The CryptoServer CSe platforms are certified up to FIPS 140-2 Level 4 (physical security) for the highest security requirements. 

Icon

Highest security for the most valuable assets

Provide secure generation, storage, and usage of keys inside the tamper-protected Hardware Security Module.

Icon

Powerful GP HSM firmware included

The included firmware provides all necessary features and crypto algorithms and enables easy plug-and-play integration with common business applications.

Icon

Crypto agile and PQC ready

Designed with crypto agility in mind, and is field-upgradeable with PQC algorithms recommended by NIST and BSI

Details

Details

CryptoServer General Purpose HSM CSe-Series


 

Cryptographic algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • Edwards curves Ed25519 and Ed448
  • AES, Triple-DES, DES
  • MAC, CMAC, HMAC
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
  • True random number generator (PTG.2 acc. AIS 31)
  • Chinese Algorithms
  • All algorithms included in the product price
     

Cryptographic Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CSP), Cryptography Next Generation (CNG) and SQL
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)
  • Data Encryption    
  • Document Signing    
  • Code Signing    
  • Certificate Issuing    
  • Public Key Infrastructure    
  • Chip and Device Personalization    
  • User and Device Authentication
  • Blockchain Processes
  • Subscriber Authentication in Mobile Networks
  • Key Agreement in Mobile Networks
  • Timestamp Creation
  • PQC applications
  • And many more

Kontakt

Ihre Fragen beantworten wir sehr gerne.

Wie können wir Ihnen helfen?

Sprechen Sie mit einem unserer Spezialisten und erfahren Sie, wie Utimaco Sie unterstützen kann.
Sie haben zwei verschiedene Arten von Downloads ausgewählt, so dass Sie verschiedene Formulare absenden müssen, die Sie über die beiden Tabs auswählen können.

Ihre Download-Sammlung:

    Direkt nach dem Absenden des Formulars erhalten Sie die Links zu den von Ihnen ausgewählten Downloads.

    Ihre Download-Sammlung:

      Für diese Art von Dokumenten muss Ihre E-Mail Adresse verifiziert werden. Sie erhalten die Links für die von Ihnen ausgewählten Downloads per E-Mail, nachdem Sie das unten stehende Formular abgeschickt haben.

      Ihre Download-Sammlung ist leer. Besuchen Sie unseren Download-Bereich und wählen Sie aus Ressourcen wie Datenblättern, Whitepapers, Webinar-Aufzeichnungen und vielem mehr.

      Downloads
      0