Hardware Security Module for secure key generation and storage for versatile use cases
The u.trust General Purpose HSM Se-Series combines superior performance with multi-tenancy. Catering to a spectrum of use cases, from entry-level to high-performance, these Hardware Security Modules (HSMs) are designed with future-proofing in mind. All models are equipped with post quantum cryptography readiness and are FIPS 140-2 Level 3 certified.
- Versatile models from entry-level to high-performance use cases
- Multiple application options to meet your business needs
- Superior performance of up to 40,000 RSA 2K operations per second
- Multi-tenancy
- Crypto agile and PQC-ready
- FIPS certified up to 140-2 Level 3
- Simulator included
Product Type:
PlatformSupported Firmwares:
Based on a modern, container-based solution, the HSM is designed for and inspired by cloud technology, offering up to 31 containers and multiple PKCS #11 partitions per cHSM for application separation and key partitioning. This makes it the ideal Hardware Security Module for all types of cryptographic applications, as it can be upgraded with various application option packs, catering to specific use cases such as blockchain and 5G mobile networks. Additionally, its flexibility extends to customization, enabling the implementation of proprietary algorithms and the establishment of customer key derivations using the Software Development Kit.
Variants
Versatile models from entry-level to high-performance use cases
Se100 | Se2k | Se5k | Se15k | Se40k |
Up to 101 RSA 2K operations / second | Up to 2,050 RSA 2K operations / second | Up to 5,100 RSA 2K operations / second | Up to 15,000 RSA 2K operations / second | Up to 40,000 RSA 2K operations / second |
1 container | 4 containers | 8 containers | 4 containers | 12 containers |
Your use case requires more containers? Discover the u.trust Converged HSM CSAR with options for 16 or 31 containers in one HSM.
Details
Cryptographic algorithms
- RSA, DSA, ECDSA with NIST and Brainpool curves, EdDSA
- DH, ECDH with NIST, Brainpool and Montgomery curves
- Edwards curves Ed25519 and Ed448
- AES, Triple-DES, DES
- MAC, CMAC, HMAC
- SHA-1, SHA-2, SHA-3, RIPEMD
- Hash-based deterministic random number generator (DRG.4 acc. AIS 31)
- True random number generator (PTG.2 acc. AIS 31)
- Chinese Algorithms
- All algorithms included in the product price
Cryptographic Interfaces (APIs)
- PKCS #11
- Java Cryptography Extension (JCE)
- Microsoft Crypto API (CSP), Cryptography Next Generation (CNG) and SQL
- Extensible Key Management (SQLEKM)
- OpenSSL
- Utimaco‘s comprehensive Cryptographic eXtended services Interface (CXI)