CryptoServer CP5
The Hardware Security Module for highest physical security requirements

CryptoServer General Purpose HSM CSe-Series

Hardware Security Module for high-security environments

The CryptoServer General Purpose HSM is designed to meet the most highest physical security requirements. Specifically designed for sensitive and critical applications prevalent in banking and government environments, its advanced sensor mechanism, which includes a sensor protection film, reacts to all types of mechanical, chemical, and physical threats. In the event of an attack, sensitive keys and data stored within the HSM’s internal memory are actively and quickly erased. This mechanism meets the requirements of FIPS 140-2 highest level 4 in the area of "physical security" and is certified according to this security standard.

Product Type:

Platform

Supported Firmwares:

Delivery Time:

Ask our sales team
Key Features

Key Features

Icon

FIPS certified up to 140-2 Level 4 (Physical Security)

The CryptoServer CSe platforms are certified up to FIPS 140-2 Level 4 (physical security) for the highest security requirements. 

Icon

Highest security for the most valuable assets

Provide secure generation, storage, and usage of keys inside the tamper-protected Hardware Security Module.

Icon

Powerful GP HSM firmware included

The included firmware provides all necessary features and crypto algorithms and enables easy plug-and-play integration with common business applications.

Icon

Crypto agile and PQC ready

Designed with crypto agility in mind, and is field-upgradeable with PQC algorithms recommended by NIST and BSI

Details

Details

CryptoServer General Purpose HSM CSe-Series


 

Cryptographic algorithms

  • RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
  • DH, ECDH with NIST, Brainpool and Montgomery curves
  • Edwards curves Ed25519 and Ed448
  • AES, Triple-DES, DES
  • MAC, CMAC, HMAC
  • SHA-1, SHA-2, SHA-3, RIPEMD
  • Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
  • True random number generator (PTG.2 acc. AIS 31)
  • Chinese Algorithms
  • All algorithms included in the product price
     

Cryptographic Interfaces (APIs)

  • PKCS #11
  • Java Cryptography Extension (JCE)
  • Microsoft Crypto API (CSP), Cryptography Next Generation (CNG) and SQL
  • Extensible Key Management (SQLEKM)
  • OpenSSL
  • Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)
  • Data Encryption    
  • Document Signing    
  • Code Signing    
  • Certificate Issuing    
  • Public Key Infrastructure    
  • Chip and Device Personalization    
  • User and Device Authentication
  • Blockchain Processes
  • Subscriber Authentication in Mobile Networks
  • Key Agreement in Mobile Networks
  • Timestamp Creation
  • PQC applications
  • And many more

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0