lock in the shield
The Hardware Security Module for highest physical security requirements

CryptoServer General Purpose HSM CSe-Series

Hardware Security Module for high-security environments

The CryptoServer General Purpose HSM is designed to meet the most highest physical security requirements. Specifically designed for sensitive and critical applications prevalent in banking and government environments, its advanced sensor mechanism, which includes a sensor protection film, reacts to all types of mechanical, chemical, and physical threats. In the event of an attack, sensitive keys and data stored within the HSM’s internal memory are actively and quickly erased. This mechanism meets the requirements of FIPS 140-2 highest level 4 in the area of "physical security" and is certified according to this security standard.

Product Type:


Supported Firmwares:

Delivery Time:

Ask our sales team
Key Features

Key Features


FIPS certified up to 140-2 Level 4 (Physical Security)

The CryptoServer CSe platforms are certified up to FIPS 140-2 Level 4 (physical security) for the highest security requirements. 


Highest security for the most valuable assets

Provide secure generation, storage, and usage of keys inside the tamper-protected Hardware Security Module.


Powerful GP HSM firmware included

The included firmware provides all necessary features and crypto algorithms and enables easy plug-and-play integration with common business applications.


Crypto agile and PQC ready

Designed with crypto agility in mind, and is field-upgradeable with PQC algorithms recommended by NIST and BSI



CryptoServer General Purpose HSM CSe-Series


Cryptographic algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • Edwards curves Ed25519 and Ed448
  • AES, Triple-DES, DES
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
  • True random number generator (PTG.2 acc. AIS 31)
  • Chinese Algorithms
  • All algorithms included in the product price

Cryptographic Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CSP), Cryptography Next Generation (CNG) and SQL
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)
  • Data Encryption    
  • Document Signing    
  • Code Signing    
  • Certificate Issuing    
  • Public Key Infrastructure    
  • Chip and Device Personalization    
  • User and Device Authentication
  • Blockchain Processes
  • Subscriber Authentication in Mobile Networks
  • Key Agreement in Mobile Networks
  • Timestamp Creation
  • PQC applications
  • And many more

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.