cryptoserver-cp5-stage
The VS-NfD-compliant solution for key processing and storage

VS-NfD

The VS-NfD-compliant solution of CryptoServer General Purpose HSM for key processing and storage

  • The only BSI-approved HSM on the market
  • Approved up to classification RESTREINT UE/EU RESTRICTED, NATO RESTRICTED, and VS-NfD
  • Secure key processing and storage in a high-security environment

Product Type:

Firmware

Supported Platforms:

Delivery Time:

About 2-4 weeks
Key Benefits

Key Benefits

Icon

Approved by the German Federal Office for Information Security (BSI)

VS-NfD for CryptoServer General Purpose HSM is the only BSI-approved HSM on the market and is therefore the alternative secure solution for key processing and storage in accordance with VS-NfD requirements.

Icon

Approved for VS-NfD, RESTREINT UE/EU RESTRICTED and NATO RESTRICTED

Approved for key storage and processing up to classification VS-NfD, RESTREINT UE/EU RESTRICTED, and NATO RESTRICTED.

Icon

Secure key processing and storage within the HSM

Meets regulatory data security standards by storing and processing the cryptographic keys within the VS-NfD approved HSM.

Details

Details

VS-NfD compliance version for CryptoServer General Purpose HSM – Processing of classified data inside a tamper-proof hard-ware security module

As the only BSI-approved VS-NfD HSM on the market, the CryptoServer HSM platform with the VS-NfD compliance version offers the ideal solution for various VS-NfD-compliant applications such as certificate creation for authentication and access control or secure key generation and management. It is the central trust anchor for the backup and processing of classified data according to VS-NfD, RESTREINT UE/EU RESTRICTED and NATO RESTRICTED.


The listings for the various approvals can be viewed at the following links.

  • You can view the listing as a VS-NfD-approved HSM here.
  • The listing as RESTREINT UE/EU RESTRICTED HSM is available here.
  • The listing as NATO RESTRICTED HSM can be found here.

Features

Easy integration

  • Support for Windows and Linux operating systems.
  • Wide range of integration options
  • Supports standardized interfaces, e.g. PKCS #11 and Microsoft Cryptography Next Generation (CNG)
  • UTIMACO Cryptographic eXtended services Interface (CXI) for easy integration into your own applications

Comprehensive key management with key authorization

  • Multi-client capability
  • Remote Management
  • Secure firmware update 
  • Reliable access control

Configurable role-based access control and segregation of duties

  • “m out of n” quorum authentication (e.g. 3 out of 5)
  • 2-factor authentication using smart cards

Meets the highest safety requirements

  • VS-NfD approval
  • RESTREINT UE/EU RESTRICTED and NATO RESTRICTED approval
  • Common Criteria EAL4+ certified
  • Protection against attacks by passive and active tamper protection mechanisms 

Free, fully functional simulator 

  • Dedicated software simulator for evaluation and integration testing

Technical Specifications

Support of numerous cryptographic algorithms

  • RSA, ECDSA with NIST and Brainpool curves
  • ECDH with NIST and Brainpool curves
  • AES
  • CMAC, HMAC
  • SHA2 family, SHA3
  • Hash-based deterministic random number generator (DRG.4 according to AIS 31)
  • True random number generator (PTG.2 according to AIS 31)
  • Up to 3000 RSA or 2500 ECDSA signature operations when processing in bulk mode

On-premise

Our on-premise options allow hosting the product directly on-site in your own network or data center.

  • LAN Appliance
  • PCIe Card

 

Related to this product

Add-ons

Full Disk Encryption

Reliable hard drive encryption for laptops with classified data processing

Find more details

LAN Crypt File and Folder Encryption

role-based file encryption software

Find more details

 

 

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0