- About Public Key Infrastructure
- Solutions
- Related Products
- Resources
About Public Key Infrastructure
A Public Key Infrastructure (PKI) governs the issuance of digital certificates to provide identities for users, devices and applications for secure authentication, confidentiality in communication, and the integrity of data generated and exchanged within an environment. Each entity can identify itself as trusted using digital certificates that are issued by the Certification Authority (CA) – an essential part of the PKI.
HSMs as the Root of Trust for PKI
A Hardware Security Module (HSM) is a tamper-resistant hardware device designed for secure cryptographic key generation, management, and storage. In a PKI, the HSM serves as the root of trust, generating the cryptographic key pairs—consisting of a private and public key—needed for digital certificate creation. The private key never leaves the device’s secure boundary, this is crucial, as the security of the entire PKI relies on protecting the private key from exposure or compromise.
Solutions for Public Key Infrastructure
Utimaco’s General Purpose HSMs provide a secure, scalable foundation for PKI with plug-and-play integration for leading PKI providers. Key Benefits:
- Certified Security – FIPS 140-2 Level 3 certified, with options for eIDAS and classified environments.
- High Performance – From entry-level to high-speed models, supporting up to 40,000 RSA 2K operations / s
- PQC-ready – u.trust General Purpose HSM Se-Series is designed crypto-agile and can be extended with PQC algorithms for a quantum-resistant PKI
Related Products
Resources

Join us for an insightful webinar and explore the top 5 applications of Hardware Security Modules (HSMs) as well as the essential role they play in securing digital environments.
The top 5 use cases of a Hardware Security Module (HSM) – incl. Demo
Join us for an insightful webinar and explore the top 5 applications of Hardware Security Modules (HSMs) as well as the essential role they play in securing digital environments.
Watch Now
Public Key Infrastructure (PKI) is a proven method to establish digital trust utilizing digital certificates. But for the security of the certificates the quality and security of the cryptographic keys, used to sign the certificates, is crucial.
The Root of Trust for Securing Connected Environments - HSMs as The Better Choice for Protecting PKI Use Cases
Public Key Infrastructure (PKI) is a proven method to establish digital trust utilizing digital certificates. But for the security of the certificates the quality and security of the cryptographic keys, used to sign the certificates, is crucial.
Watch Now
This document provides a quick background to PKI-based digital signatures and an overview of how the signature creation and verification processes work. It also describes how the cryptographic keys used for creating and verifying digital signatures are managed.
Ascertia: Basics of Digital Signatures & PKI
This document provides a quick background to PKI-based digital signatures and an overview of how the signature creation and verification processes work. It also describes how the cryptographic keys used for creating and verifying digital signatures are managed.
다운로드
Keyfactor EJBCA is the PKI platform that deploys fast, runs anywhere, and scales on demand. Utilizing Utimaco’s FIPS 140-2 Level 3 validated Hardware Security Modules (HSM), the cryptographic keys used as the core of the PKI are always protected and the private keys never leave the secure environment of the HSM.
Keyfactor: Generation, management and storage for cryptographic keys used in a PKI
Keyfactor EJBCA is the PKI platform that deploys fast, runs anywhere, and scales on demand. Utilizing Utimaco’s FIPS 140-2 Level 3 validated Hardware Security Modules (HSM), the cryptographic keys used as the core of the PKI are always protected and the private keys never leave the secure environment of the HSM.
다운로드
Utimaco and Nexus provide a secure, powerful and fit-for-purpose Factory Certificate Authority (CA) solution, relying on Utimaco's u.trust General Purpose HSM Se-Series and Nexus PKI Certificate Manager™ software. The solution includes operation of one or multiple CA instances: self-signed or signed by another CA.
Nexus: Providing an HSM-based Factory Certificate Authority for reliable IoT Device Integrity
Utimaco and Nexus provide a secure, powerful and fit-for-purpose Factory Certificate Authority (CA) solution, relying on Utimaco's u.trust General Purpose HSM Se-Series and Nexus PKI Certificate Manager™ software. The solution includes operation of one or multiple CA instances: self-signed or signed by another CA.
다운로드