Key Attestation
Challenge
Companies requiring digital identity applications with qualified certificates and signatures often struggle withensuring the trusted issuance of certificate keys. Currently, this involves undergoing costly and complex key ceremony procedures that must be audited and approved by a certification authority. Additionally, securely managing these identity keys is both expensive and unscalable. This process requires trust that the audited procedures are consistently applied to all newly generated keys, adding complexity to the process.
Solution
With the Securosys Key Attestation feature, you achieve cryptographic verification of your keys and their attributes through a chain of trust originating from our root certificate. This allows you to automate the key ceremony audit process, enabling trusted issuance of digital identity keys on a virtually limitless scale.
By leveraging Key Attestation, you significantly reduce the costs and complexity associated with public certificate key ceremonies and key distribution. This solution not only saves money but also greatly enhances the scalability and efficiency of your digital identity applications, providing you with a seamless and reliable experience.
How does it work?
Each Primus HSM is CC EAL4+ certified. The device autonomously generates an intermediary (device) key, which is then signed by the root key. This intermediary key is subsequently used to sign the attestation and timestamp keys created for each partition.
- Attestation Key: Validates the origin and attributes of newly generated keys, affirming they were created on the specific HSM.
- Timestamp Key: Generates certified signatures and supports applications incorporating time-based key attributes.
This system allows digital identity applications to autonomously generate and validate user or device identities and certified signatures without the need for additional procedures or external authorities. It ensures the origin of keys and secures hardware with minimal additional costs, effortlessly scaling for IoT and personal identity applications.