Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware security modules (HSMs). Today, we’re also excited to share that the YubiHSM 2 FIPS now meets FIPS 140-2, Level 3. Jump ahead to the “what’s new” section below to learn about the key new features in our YubiHSM 2 products.

While credential theft and phishing attacks continue to skyrocket, so do the number of server-based attacks. Approximately 85% of all data breaches involve human interaction — a fact reinforced by the dizzying array of breaches to hit news headlines last year, not to mention what we expect to see again this year, only accelerated.

The YubiHSM 2 product lineup delivers advanced protection for certificate authority (CA) keys, database master keys, code signing, authentication/access tokens, manufacturing processes and component authenticity checks, IoT gateways or proxies, file encryption, cryptocurrency exchanges and more. The rise of threats like zero day exploits and malware makes software-based cryptographic key storage increasingly vulnerable for organizations. Alternatively, HSMs offer advanced protection, backed by tamper-resistant hardware, for servers and the cryptographic keys stored within them.


Why is this important?

Provides secure hardware protection for cryptographic keys

  • The YubiHSM 2 and YubiHSM 2 FIPS enable secure key storage and operations on tamper-resistant hardware, with audit logging. This prevents accidental copying and distribution of keys, and remote theft of cryptographic software keys. Extensive cryptographic capabilities include: hashing, key wrapping, asymmetric signing, decryption, attestation and more.

Leverages innovative design for flexible use and simple deployment

  • Traditional rack-mounted and card-based HSMs are not practical for many organizations due to their size and deployment complexity. The YubiHSM 2 lineup offers a portable ‘nano’ form factor that allows fast and flexible deployment across diverse environments. It fits easily into a USB-A slot, lying almost flush to remain concealed.

Offers low-cost, high security ROI

  • The YubiHSM 2 FIPS delivers government-grade high cryptographic security and operations at a price point that is up to 90% cheaper than traditional HSMs. Additionally, low-power usage reduces business energy consumption.


So, what’s new?

With the latest SDK libraries, tools, and the new 2.3.1 firmware just released, roadblocks that prevented YubiHSM 2 products integration with more widely available libraries and operating systems have been removed. This ensures smooth integration with libraries that are used by public sector agencies such as the Department of Defense among others.

Key new features both versions of the YubiHSM 2 lineup include:

Support for Advanced Encryption Standard (AES) in Electronic Code Book (ECB) and Cipher Block Chaining (CBC) modes.

  • AES is one of the most widely used symmetric cryptography algorithms and can be used in several modes such as ECB, CBC, CCM and GCM. Out of these four modes, YubiHSM 2 now supports three most commonly used modes of encryption.

Support for authentication using asymmetric encryption.

  • This feature enables authentication to YubiHSM 2 using Public Key Infrastructure (PKI) where authentication credentials can be stored in a YubiKey enhancing the security of the authentication mechanism.

Support for storing custom information for keys and other objects transparently in YubiHSM 2.

  • Prior to this enhancement, YubiHSM 2 only supported a specified set of information per type of objects. This prevented integration with a few cryptographic libraries that required storing information that did not conform to the template supported by YubiHSM 2.
  • With this enhancement, information that does not conform to the standard template for keys, can also be stored in YubiHSM 2. This removes the roadblocks that prevented integration of YubiHSM 2 with certain libraries and operating systems.



About DT Asia

DT Asia began in 2007 with a clear mission to build the market entry for various pioneering IT security solutions from the US, Europe and Israel.

Today, DT Asia is a regional, value-added distributor of cybersecurity solutions providing cutting-edge technologies to key government organisations and top private sector clients including global banks and Fortune 500 companies. We have offices and partners around the Asia Pacific to better understand the markets and deliver localised solutions.