TryTRY
BuyBUY
  • newsletter
  • contact
  • corporate
  • careers
Utimaco
de
TRYour free HSM simulator
BUYget a quote
  • home
  • solutions
  • products
  • services
  • blog
  • downloads
  • partners
  • company

Utimaco Portal

Here you will find everything you need as a partner and customerLogin required

  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • key management
      • Enterprise Key Management
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • key management
      • Enterprise Key Management
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research

Home / solutions / applications / blockchain

blockchain

Blockchain is a technology that promises to change how data is stored and businesses operate.

It is important to ensure that the blockchain, and the data that it stores, is properly protected.

Store your cryptographic material for blockchain in a Hardware Security Module (HSM)!

Read about our blockchain partnership with ThothTrust

Utimaco wins Fintech Award 2019 for its Block-safe solution

Utimaco Hardware Security Modules - Blockchain Icon

Securing Blockchain – no single point of failure?

Historically, blockchain was designed to enable a distributed and decentralized currency in which no party had a controlling interest and that had no single point of failure. Does this mean securing blockchain is unnecessary?

A blockchain is essentially an immutable record of the history of a set of data that is maintained in a distributed fashion by a network of mutually distrusting parties. The historical record of a blockchain transactions can be trusted because it is based on the security of cryptographic algorithms rather than the integrity of the organization storing the record. Each transaction on the blockchain is digitally signed by its creator; transactions are gathered into blocks that are also digitally signed; and blocks are chained together by including the cryptographic hash of each block in the following block.

The Importance of Securing the Blockchain

Blockchains have been applied to a variety of purposes, but in all cases, they store valuable information. In the case of cryptocurrencies, the data stored on the blockchain is the record of transactions between users and thus the amount of currency stored in each user’s account. Other blockchains may store records of contractual agreements, proof of ownership of digital or tangible assets, or other valuable information.

Securing blockchain: hash functions and digital signatures …

Securing the blockchain is of paramount importance. If the historical record could be modified after the fact, users could perform “double spend” attacks, where a transaction is performed and stored in a block that is later replaced with a block that does not contain the transaction after the user receives the asset that they purchased.

The security of the blockchain essentially boils down to the security of cryptographic hash functions and cryptographic digital signatures. Currently, the underlying cryptographic algorithms that secure the blockchain are considered secure against attacks; however, this will not always be the case. A more immediate threat to blockchain security is the security of the private keys used to manage identity on the blockchain.

… and the private key

A digital signature is a cryptographic operation that verifies that the signed data was signed by the owner of a particular private key and has not been modified since the signature was created. The only requirement for creating a signature that can be linked to a certain person is possession of their private key. A stolen private key gives the thief complete control over a user’s account on the blockchain, and, since the blockchain is immutable, any transaction performed by the thief is irreversible. Protecting private keys is vital to the security of any blockchain account.

Blockchain applications. Don’t compromise privacy, authenticity or security

The application of the blockchain to business usage is still in its infancy. The distributed and decentralized nature of the blockchain can provide huge cost savings for hosting requirements and business continuity and disaster recovery. However, this may come at the cost of privacy, authenticity and security.

Using Hardware Security Modules

The integration of a Hardware Security Module (HSM) into a blockchain solution can help organizations regain the privacy and security that may be lost by distributing proprietary software to an untrusted network of blockchain operators. By storing private keys and data within the HSM, data integrity and user authentication can be dramatically improved. Proprietary code can even be stored and run fully within an HSM to protect intellectual property.

The Future of Blockchain

Historically, the blockchain has remained widely unregulated and blockchain-based platforms have operated as decentralized organizations with little or no centralized government due to trusting in the security of cryptographic algorithms to provide stability to the blockchain.

One of the major threats to blockchain technology in its current state is the creation of quantum computers. Current cryptographic algorithms are secure against traditional computers but not against quantum computers. To be secure, blockchain solutions should employ HSMs with support for quantum-safe cryptographic algorithms to protect proprietary data and code.

Many industries have regulations and certifications governing how they process and store data. As blockchain becomes more widely used in industry, regulations and certifications will be created to govern how blockchain solutions operate. Using HSMs to secure data can help meet regulatory and certification requirements.

Blockchain is a new technology that promises to change how data is stored and businesses operate. As solutions are developed and deployed using blockchain to solve problems, it is important to ensure that the blockchain, and the data that it stores, is properly protected.

Ready to take off?

Download our HSM simulator!

Register for free
Take me there

Stay on top of our news
Don’t miss out on any Utimaco updates

Subscribe to Utimaco Newsletter

We will keep you posted with news from Utimaco and the industries we protect, as well as information on upcoming events and webinars.

Subscribe now

Partners

intarsys AG Macroseguridad Utimaco HSM - PTESA_profesionales en transacciones electronicas JJNet International Co., Limited - Utimaco Hardware Security Modules Partner Fornetix - Utimaco Hardware Security Modules Partner Astel (UK) Ltd. - Utimaco Hardware Security Modules Partner PKI Solutions Inc. CREA plus d.o.o. MTG - Utimaco Hardware Security Modules Partner MIcrosec EUROPEAN DYNAMICS SA. Komar Consulting Inc. - Utimaco Hardware Security Modules Partner Baas Control s.r.o. IQuantics Corp Secure Source Distribution (M) Sdn Bhd - Utimaco Hardware Security Modules Partner SecureMetric Technology Sdn. Bhd. Compumatica secure networks GmbH Cryptomathic A/S Utimaco HSM - InfoGuard Swiss Cyber Security Thomas-Krenn.AG Nexus - Utimaco Hardware Security Modules Partner AKEA S.A. - Utimaco Hardware Security Modules Partner Utimaco HSM - QuintessenceLabs Nexus Technology GmbH E-Sign S.A. Clearkey Consulting - Utimaco Hardware Security Modules Partner Cogito Group Pty Ltd Safesoft Kft. MALKOM D.Malińska i Wspólnicy s.j. Microexpert Limited CertiSur S.A. ESYSCO Sp. z o.o. Cyber Armor Pte Ltd Rohde & Schwarz Cybersecurity GmbH Cryptomathic GmbH Telegrupp AS cv cryptovision GmbH CEGA Security Synergy Computers (Pvt.) Ltd. - Utimaco Hardware Security Modules Partner Primekey Solutions AB PrimeKey Labs GmbH Envoy Data Corporation - Utimaco Hardware Security Modules Partner Versasec CREAplus Italia S.r.l Compumatica secure networks B.V. Altacom UAB Ascertia - Utimaco Hardware Security Modules Partner Skytech Computing Solutions Limited. - Utimaco Hardware Security Modules Partner Perceptus-sp.-z-o.-o. Abrantix AG Softline Solutions GmbH PETA (Thailand) Co., Ltd. VAR Group SpA - Utimaco Hardware Security Modules Partner Cryptomathic Inc. CewTec S.A. Real security d.o.o. Throughwave (Thailand) Co.,Ltd - Utimaco Hardware Security Modules Partner Nexus - Utimaco Hardware Security Modules Partner Fortiedge Pte Ltd. Encryption Consulting LLC
Find a partner

Share this page

EMEA

Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200

Americas

Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO

APAC

Utimaco IS Pte Limited
80 Raffles Place,
#32-01, UOB Plaza
Singapore 048624
Phone: +65 6622 5347

Utimaco

  • support
  • corporate
  • careers
  • legal
  • terms & conditions
  • privacy
  • cookie-policy
© 2021
to top
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • key management
      • Enterprise Key Management
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research