CryptoServer CP5
The Hardware Security Module for eIDAS-compliance and classified use cases

CryptoServer General Purpose HSM

Apply Cryptographic Processes for Qualified Signatures and Seals and classified environments

The CryptoServer General Purpose HSM is designed for eIDAS-compliant and classified use cases. This makes it the ideal Hardware Security Module for governments, public sector, and organizations that need to fulfill certain compliance regulations, such as Trust Service Providers or critical infrastructure providers. 

The CryptoServer General Purpose HSM offers different compliance versions:

  • The CC eIDAS compliance version is specifically designed and certified for the creation of eIDAS-compliant qualified signatures and seals, remote signing and the issuing of qualified certificates.  It is Common Criteria-certified according to the eIDAS Protection Profile (PP) EN 419 221-5 “Cryptographic Module for Trust Services”.  
  • The VS-NfD compliance version is approved by the German Federal Office for Information Security (BSI) and can be applied in classified environments according to VS-NfD, RESTREINT UE/EU RESTRICTED and NATO RESTRICTED.
     

Product Type:

Platform

Supported Firmwares:

Delivery Time:

Ask our sales team
Key Features

Key Features

Icon

Qualified Signature and Seal Creation Device (QSCD)

CC eIDAS on CryptoServer General Purpose HSM can be used as an eIDAS certified Qualified Signature and Seal Creation Device.

Icon

CC-Certified

Common Criteria-certified according to the eIDAS Protection Profile (PP) EN 419 221-5 “Cryptographic Module for Trust Services”

Icon

Trust Anchor for classified data

CryptoServer General Purpose HSM with the VS-NfD compliance version is the only BSI-approved VS-NfD HSM on the market, allowing the backup and processing of classified data according to VS-NfD, RESTREINT UE/EU RESTRICTED and NATO RESTRICTED.

Icon

Simulator included

Test CryptoServer firmware with our free fully functional simulator for evaluation and integration testing before deployment. 

Details

Details

cryptoserver-cp5-stage


 

Cryptographic algorithms

  • RSA, ECDSA with NIST and Brainpool curves
  • ECDH with NIST and Brainpool curves
  • AES
  • CMAC, HMAC
  • SHA-2, SHA-3
  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
  • True random number generator (PTG.2 acc. AIS 31
     

Cryptographic Interfaces (APIs)

  • PKCS #11
  • Cryptography Next Generation (CNG)
  • Key authorization API and tool
  • Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)
  • Qualified Signatures    
  • Qualified Seals    
  • Remote Signing
  • Classified Data Processing
  • Data Encryption    
  • Document Signing    
  • Code Signing    
  • Certificate Issuing
  • Public Key Infrastructure
  • Chip and Device Personalization
  • User and Device Authentication
  • And many more

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads