What is a Hardware Security Module (HSM)?

Definition: A hardware security module (HSM) is a ‘trusted’ physical computing device that provides extra security for sensitive data. This device creates, provides, protects and manages cryptographic keys for functions such as encryption and decryption and authentication for the use of applications, identities and databases.

Discover Utimaco’s HSM portfolio here.


Hardware Security Module (HSM) explained

A hardware security module is a tamper and intrusion-resistant, highly-trusted physical device that performs all major cryptographic operations, including encryption, decryption, authentication, key management and key exchange. The sole purpose of an HSM is to conceal and protect cryptographic data. They have a robust operating system and restricted network access via a firewall. HSMs need to comply with a range of standards and regulations, which include the following:

An HSM is a ‘trusted’ device because it:

  • Is built on top of specialized hardware. In special laboratories, the hardware has been thoroughly tested and certified
  • Has a security-focused operating system
  • Has restricted access through a network interface that is strictly governed by internal rules
  • Actively hides and protects cryptographic data.

HSMs can be found in smart cards, dedicated cards found in hardware (cryptographic cards), portable devices, self-contained devices (appliances), IoT devices installed on site, hosted, or offered as a cloud service (HSM-as-a-Service).

There are two main types of Hardware Security Module:

1. General Purpose

General Purpose HSMs can utilize the most common encryption algorithms, such as PKCS#11, CAPI, CNG as well as other common algorithms, which are mainly used with Public Key Infrastructures to safe-guard digital keys and certificates (which protect PKI from being breached), crypto-wallets, and other basic sensitive data.

2. Payment & Transaction

A Payment HSM is used primarily by the banking industry for the protection of payment transactions which include:

  • the use of PIN (generation, management, validation and translation of the PIN Block in transactions carried out at POS and ATMs)
  • the protection of electronic fund transfers (EFT)
  • the generation of data for magnetic strips and EMV chips in card production and personalization processes
  • the processing of payment transactions with debit and credit cards
  • the validation of cards, users and cryptograms during payment transaction processing
  • Payment credential issuing for payment cards and mobile applications

Payment HSMs generally provide cryptographic support for most card brands' payment applications, and their interconnection interfaces are usually more limited than those of general-purpose HSMs.

Benefits of using HSMs

Hardware Security Modules have a number of benefits including:

  • Tamper-resistant, tamper-evident, and tamper-proof systems to provide extremely secure physical systems
  • Providing the highest level of security for sensitive data and cryptographic keys on the market
  • Meeting security standards and regulations
  • Cryptographic key lifecycle tasks can be automated quickly and efficiently
  • Cryptographic keys are stored in a single location rather than in multiple locations.

Being a physical device with a powerful operating system and limited network access, makes an HSM the "Root of Trust" in an organization's security infrastructure.



Blog posts

Blog posts

Related products

Related products

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.