FIPS 140-3 Level 3 USB Hardware Security Module
AegisPQC-HSM: Portable Quantum-Safe Root of Trust
The AegisPQC-HSM USB is a portable hardware security module implementing all three NIST-standardized post-quantum cryptography algorithms in a compact USB 3.2 Gen 2 form factor. Designed for secure key generation, storage, and cryptographic operations, it combines the power of our AegisPQC-Lite chip with secure key storage, tamper detection, and FIPS 140-3 Level 3 certification.
Secure Your Identity in a Post-Quantum World
The AegisPQC-HSM USB brings the security of a full-scale hardware security module to a compact, portable form factor. Powered by the AegisPQC-Lite core, it provides a dedicated environment where private keys are generated, stored, and used—never leaving the hardware.
Request Quote
Technical Documentation
Get PKCS#11 Drivers
Why Choose AegisPQC-HSM?
True Hardware Isolation
Private keys are locked behind a physical barrier, protected by a hardware-based PUF (Physical Unclonable Function).
NIST Standardized
Native acceleration for FIPS 203 (ML-KEM), 204 (ML-DSA), and 205 (SLH-DSA).
Tamper-Reactive
Internal sensors detect physical intrusion, voltage glitching, or extreme temperatures, triggering an immediate zeroization of all sensitive data.
Internal Architecture
At the heart of the device is a sophisticated multi-layered architecture that separates the external USB communication from the internal cryptographic operations.
Component Breakdown
1. AegisPQC-Lite Core
Handles the heavy lifting of NTT-based and Hash-based cryptography at 800 MHz.
2. Secure Microcontroller
A dedicated RISC-V core acts as the gatekeeper, managing the PKCS protocol stacks and secure boot.
3. Encrypted Key Storage
16 MB to 64 MB of AES-256-GCM encrypted flash, capable of storing up to 16,000+ keys.
Security: FIPS 140-3 Level 3 Implementation
We don't just protect against hackers; we protect against physical theft and lab-grade side-channel attacks.
-
Tamper Mesh: A fine-wire mesh embedded in the PCB detects any attempt to drill or probe the circuit.
-
PUF Identity: The device's master encryption key is derived from the unique physical characteristics of the silicon, making it impossible to "clone" the device.
-
Active Zeroization: In the event of a breach, the device wipes its internal SRAM and destroys the flash decryption keys in under 10 microseconds.
Application Use Cases
1. Secure Code Signing
Protect your software supply chain. Signing keys remain on the HSM, ensuring that even if your build server is compromised, your signing authority remains secure.
2. Archival Document Signing
Use SLH-DSA for documents that require 50-year validity. The hash-based nature of SLH-DSA makes it the most stable long-term signature standard available.
3. Remote Admin Authentication
Replace vulnerable password-based logins with hardware-backed ML-DSA authentication for SSH and VPN access.
Ready to Secure Your Data?
Contact us to see the available dates and discuss about the features or customization.
Request Bulk Quote
Contact Us