• Twitter
  • Linkedin
  • Resellers
  • Customers
  • Dashboard
    • Account
      • Logout
  • Basket
  • Storefront
    Give us a call: +44 (0) 1865 594724
    ID3
    • Home
    • About Us
    • Services
      • PKI
      • payShield Migration
      • Key Migration
      • Key Block Migration
      • HSM Implementation
      • Formal Key Ceremonies
      • Document Development
      • Workshops & Awareness Training
      • Consulting Services
      • Audit
        • PCI Consulting and Risk Management Services
        • HSM estate audit and health check
    • Solutions
      • Authentication & ID Management
      • Digital Signature & Certificate Management
      • Digital Payments
      • Key Management & Quantum
      • Virtual Appliance & HSM
    • Contact
    • Search
    • Menu
    • Home
    • About Us
    • Services
      • PKI
      • payShield Migration
      • Key Migration
      • Key Block Migration
      • HSM Implementation
      • Formal Key Ceremonies
      • Document Development
      • Workshops & Awareness Training
      • Consulting Services
      • Audit
        • PCI Consulting and Risk Management Services
        • HSM estate audit and health check
    • Solutions
      • Authentication & ID Management
      • Digital Signature & Certificate Management
      • Digital Payments
      • Key Management & Quantum
      • Virtual Appliance & HSM
    • Contact

    DOWNLOAD GUIDE    RESEARCH    INTEGRATION    RESOURCES

    Utimaco Crypto-Store Quote

    DOWNLOAD STEP BY STEP GUIDE

    Atalla AT1000 - NextGen Payments HSM The Utimaco Atalla Hardware Security Module (HSM) is a NextGen PCI PTS HSM v3.0 and FIPS 140-2 Level 3 certified payment HSM designed to protect customer sensitive data, perform cardholder authentication, and manage the cryptographic keys used in ecommerce retail payment transactions. Product data sheet Atalla AT1000 - NextGen Payments HSM The Utimaco Atalla Hardware Security Module (HSM) is a NextGen PCI PTS HSM v3.0 and FIPS 140-2 Level 3 certified payment HSM designed to protect customer sensitive data, perform cardholder authentication, and manage the cryptographic keys used in ecommerce retail payment transactions. Product data sheet Is now available in fully managed cloud as HSMaaS!

    Product Highlights

    Atalla HSMs are used by global payment leaders and card brands to secure their payment ecosystem and achieve the highest level of compliance.

    • PIN Processing
    • 3-D Secure v1 & v2 cryptography
    • Card / User Verification
    • ATM Interchange
    • Data Integrity
    • Processing Transaction Data
    • Data Encryption / Decryption
    • Initialize Remote Payment Devices
    • PIN Translations and Authorization
    • Payment Card Verification, Production and Personalization
    • Electronic Funds Interchange (EFTPOS, ATM)
    • AS2805 Host-to-Host
    • Cash-Card Reloading
    • EMV Transaction Processing
    • Key Generation and Injection
    • ATM Remote Key Loading
    • Interbanking Clearing and Settlement
    • Card Issuance
    • Alternative Payment Methods Including
      • Mobile and e-Wallets
      • Contactless
    • Cloud Payment Standards
    • End-to-End Encryption (E2E) of credentials for Internet and Mobile Banking
    CONTACT ID-3 TODAY TO DISCUSS THE RIGHT HSM CLOUD STRATEGY FOR YOU

    Start implementing your quantum-safe roadmap now.
    Protect the future of your business.

    Are you one of many businesses dependant on the following to secure data?

    If so, the future of your business is at risk. Make sure you become quantum-safe!

    Work with the HSM the PQC experts from Microsoft Research, evolutionQ and ISARA work with.

    Use the Utimaco Q-safe simulator to implement your quantum-safe roadmap now!

    Utimaco Crypto-Store Quote

    ID-3 and Utimaco PDQ building blocks: Know how & Network, Consulting and Tools

    UTIMACO Q-safe 1.0

    Q-safe offering, what do you get?

    Firmware Module – Implementing PDQ Algorithms

    • Extension for existing SecurityServer Se-Series Gen2 and CSe-Series HSMs
    • Retro-fittable to installed base (min: SecurityServer 4.31.0)
    • For Windows and Linux simulator

    PKCS#11 – Vendor Defined Mechanisms

    • Key Generation
    • Signature Creation/Verification
    • Key Derivation

    Tools – Key Import / Export

    Documentation

    Sample Code for each supported algorithm

    The quantum threat means that critical data may become unprotected

    ID-3 and Utimaco PDQ building blocks: Knowhow & Network, Consulting and Tools

    Implementation Tools

    Implement the technical tools for proof of concept and quantum secure your infrastructure.

    PDQ Consultancy

    Assess which part of your technical infrastructure is prone to PQC risk.

    Know how & Network

    Determine your PDQ roadmap & identify critical paths to achieve quantum secure business ambitions.

    Contact ID-3 today to discuss the right quantum strategy for you

    ID-3 and Utimaco PDQ building blocks: Knowhow & Network, Consulting and Tools

    Implementation Tools

    Implement the technical tools for proof of concept and quantum secure your infrastructure.

    PDQ Consultancy

    Assess which part of your technical infrastructure is prone to PQC risk.

    Know how & Network

    Determine your PDQ roadmap & identify critical paths to achieve quantum secure business ambitions.

    Contact ID-3 today to discuss the right quantum strategy for you

    Contact ID-3 to talk more about the Utimaco quantum solution and services

    Implement quantum-safe algorithms with the Utimaco Q-safe simulator in your digital infrastructure.

    Do you need to run a Proof of Concept (POC) for your products and crypto infrastructure ‘compatibility’ with quantum-safe algorithms?
    With the Utimaco Q-safe Simulator, you can generate and implement digital signatures, public key encryption and key agreement using the quantum-safe algorithms Dilithium and/or key transport with Kyber.

    Both Crystals-Dilithium and Crystals-Kyber algorithms have been submitted to NIST in response to their call for submissions to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms and made it to round 2.

    Utimaco Q-safe HSM simulator with Post-Quantum safe algorithms

    If you want to learn more about Post Quantum Crypto and the network of experts Utimaco is working with, feel free to use the following resources:

    • The Utimaco Blog on Post Quantum Crypto 
    • Utimaco’s e-book “Post-Quantum Crypto for Dummies”
    • The webinar with Brian LaMaccia from Microsoft Research:
      • Recording
      • Slides
    • And white papers on:
      • “Post-quantum cryptography: Secure encryption for the quantum age”
      • “Efficient Implementation of Lattice Cryptography”

    Be sure to subscribe to our newsletter to stay up to date with the latest news and developments – in August we will be updating our Simulator to version 1.1 to include hash-based signatures (HSS, XMSS, XMSS-MT (multi-tree)).

    Be sure to stay up to date with the latest news and developments – in August Utimaco will be updating the Simulator to version 1.1 to include hash-based signatures (HSS, XMSS, XMSS-MT (multi-tree)).

    Crypto-Store Quote

    ABOUT

    ID-3 is an Oxford based consultancy with 15 years of global industry experience working with mainly finance, legal and government departments… (read more… )

    SERVICES ID3

    Key Block Migration 

    Key Migration 

    HSM Implementation 

    Formal Key Ceremonies

    Document Development 

    Workshop & Awareness Training

    Consulting Services

     

    CONTACT ID3

    UK Office: Rectory Mews, Crown Road
    Wheatley, Oxfordshire, OX33 1UL, UK

    EU Office: Design Office, Leipziger Platz 16
    10117 Berlin, DE

     

    Tel: +44 (0) 1865 594724

    email: enquiries@id-3.co.uk

    MY AREA

    Customers
    Resellers


    You’re not a member?

    Registration

    © 2019-2020 Copyright - ID3. All right reserved- Privacy and Terms of Use
    • Twitter
    • Linkedin
    Scroll to top

    This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

    OKLearn more

    Cookie and Privacy Settings

    How we use cookies

    We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

    Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

    Essential Website Cookies

    These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

    Because these cookies are strictly necessary to deliver the website, you cannot refuse them without impacting how our site functions. You can block or delete them by changing your browser settings and force blocking all cookies on this website.

    Other external services

    We also use different external services like Google Webfonts, Google Maps and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

    Google Webfont Settings:

    Google Map Settings:

    Vimeo and Youtube video embeds:

    Privacy Policy

    You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

    Privacy Policy