Product Highlights
Atalla HSMs are used by global payment leaders and card brands to secure their payment ecosystem and achieve the highest level of compliance.
- PIN Processing
- 3-D Secure v1 & v2 cryptography
- Card / User Verification
- ATM Interchange
- Data Integrity
- Processing Transaction Data
- Data Encryption / Decryption
- Initialize Remote Payment Devices
- PIN Translations and Authorization
- Payment Card Verification, Production and Personalization
- Electronic Funds Interchange (EFTPOS, ATM)
- AS2805 Host-to-Host
- Cash-Card Reloading
- EMV Transaction Processing
- Key Generation and Injection
- ATM Remote Key Loading
- Interbanking Clearing and Settlement
- Card Issuance
- Alternative Payment Methods Including
- Mobile and e-Wallets
- Contactless
- Cloud Payment Standards
- End-to-End Encryption (E2E) of credentials for Internet and Mobile Banking
Implementation Tools
Implement the technical tools for proof of concept and quantum secure your infrastructure.
PDQ Consultancy
Assess which part of your technical infrastructure is prone to PQC risk.
Know how & Network
Determine your PDQ roadmap & identify critical paths to achieve quantum secure business ambitions.
Contact ID-3 today to discuss the right quantum strategy for you
Implementation Tools
Implement the technical tools for proof of concept and quantum secure your infrastructure.
PDQ Consultancy
Assess which part of your technical infrastructure is prone to PQC risk.
Know how & Network
Determine your PDQ roadmap & identify critical paths to achieve quantum secure business ambitions.
Contact ID-3 today to discuss the right quantum strategy for you
Do you need to run a Proof of Concept (POC) for your products and crypto infrastructure ‘compatibility’ with quantum-safe algorithms?
With the Utimaco Q-safe Simulator, you can generate and implement digital signatures, public key encryption and key agreement using the quantum-safe algorithms Dilithium and/or key transport with Kyber.
Both Crystals-Dilithium and Crystals-Kyber algorithms have been submitted to NIST in response to their call for submissions to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms and made it to round 2.
If you want to learn more about Post Quantum Crypto and the network of experts Utimaco is working with, feel free to use the following resources:
- The Utimaco Blog on Post Quantum Crypto
- Utimaco’s e-book “Post-Quantum Crypto for Dummies”
- The webinar with Brian LaMaccia from Microsoft Research:
- And white papers on:
Be sure to subscribe to our newsletter to stay up to date with the latest news and developments – in August we will be updating our Simulator to version 1.1 to include hash-based signatures (HSS, XMSS, XMSS-MT (multi-tree)).