Apply Quantum-Resistance to your Crypto Infrastructure

Quantum Protect

The Post Quantum Cryptography extension for Utimaco Hardware Security Modules

Quantum Protect upgrades your Utimaco General Purpose HSM with proven and recommended post quantum cryptography algorithms for a secure transition into the quantum era.

  • Includes a Software simulator for evaluation and integration testing
  • Use lattice and hash-based cryptographic algorithms for encryption and digi-tal signatures
  • Supports PQC algorithms recommended by NIST & BSI:

Product Type:


Delivery Time:

Ask our sales team
Key Benefits

Key Benefits


Post Quantum Cryptography (PQC) Algorithms

Offers PQC algorithms for signature creation and key encapsulation that can be applied to an existing cryptographic infrastructure.


PQC Evaluation for your Use Cases

Prepare for future challenges by using the Quantum Protect simulator and evaluating the performance and usability of PQC algorithms within your environment and for your use case


In-field upgrade for crypto agility

Quantum Protect is available as an in-field upgrade to your Utimaco HSM – ideal for crypto agility.



Quantum Protect – Adding Quantum-Resistance to Applications and Use Cases

Quantum Protect is the firmware extension for integrating post quantum cryp-tography into business applications and IT infrastructures.

By offering lattice and hash-based algorithms for both key encapsulation mechanisms and digital signatures it can be applied to a variety of use cases which are threatened by quantum computers such as document signing or code signing, issuing of certificates for public key infrastructures (PKI), or key injection and chip personalization by executing quantum-safe crypto algo-rithms within the secure boundaries of the HSM.

The algorithms supported by Quantum Protect are amongst the finalists of the ongoing NIST standardization process and have been endorsed by BSI (Feder-al Office for Information Security, Germany). These algorithms are the building blocks for quantum-safe infrastructures and for hybrid crypto schemes that will be deployed in a transition phase to defend against the threat to traditional asymmetric cryptography posed by the emergence of quantum computing.

Because Quantum Protect is retrofittable, it can be easily added to the u.trust General Purpose HSM Se-Series. It is also available as a simulator extension, which makes evaluation and integration testing of Post Quantum Cryptography algorithms with business applications simple.


Support PQC algorithms recommended by NIST and BSI

  • CRYSTALS-Dilithium (ML-DSA), LMS, HSS, XMSS and XMSS-MT for digital signatures
  • CRYSTALS-KYBER (ML-KEM) for key encapsulation

Easy integration

  • Application integration using PKCS #11 “Vendor Defined Mecha-nisms”
  • Firmware module for in-field upgrade on your Hardware Security Module
  • Simulator for evaluation, development, and integration testing
  • Secure backup and restore functionality
  • Available for stateful schemes


Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • Firmware Extension

As a service

Our as-a-service options are hosted by Utimaco in certified datacenters and include everything from set-up to deployment to maintenance.

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.