PKI and Certificate Authorities
Solution Design Full Implementation Current State Audit
Modern PKI and CA
Crypto-agile infrastructure without compromise
PKI (Public Key Infrastructure) is a technology for secure management of digital certificates and encryption keys. It forms the foundation for trusted communication, user and device authentication, data encryption, and electronic document signing.
A strong and secure PKI infrastructure is essential to today’s digital world. With our solutions, you gain full control over your digital identity and ensure maximum protection of your data and communications.
We build domain PKIs including operational, contingency, and security documentation.
We deploy certification authorities designed for future expansion and the integration of additional modules.
Physical protection of deployed servers as well as secure data storage in HSMs (Hardware Security Modules).
Deploying a modern domain PKI brings key advantages:
Encrypted communication, digital signatures, secure digitalization, and strong data protection across your organization.
Simplified certificate management through automated processes.
Our solutions allow rapid adaptation to new algorithms, standards, or threats. This includes authority reconfiguration, migration to newer algorithms, or readiness for post-quantum cryptography.
We specialize in building multi-layered certification authority infrastructures
We implement the latest standards in encryption and authentication (x509, post-quantum cryptography, elliptic curves)
Top-level protection for private keys using hardware security modules
Simple and efficient certificate lifecycle management with automation
From analysis and design to implementation and support, we tailor solutions to your specific needs
Certification Authorities and PKI for Every Organization
Whether you’re a bank, a healthcare provider, or a tech company, a robust PKI is essential for data protection, secure authentication of users and devices, and digital document signing. Our solutions provide high-level security and seamless integration into your existing systems.
Public Key Systems
- Authentication
- Smartcard Logon (two-factor authentication)
- Electronic Signature and Non-repudiation
- Electronic Seal
- Data Encryption and Protection (EFS, S/MIME, HTTPS,…)
-
Design of Certification Authority Hierarchies
-
Role and Permission Management
-
Active Directory Certificate Services (PKI based on Microsoft Windows Server)
-
Key Archiving and Recovery
-
OCSP, NDES, CDP, AIA
-
Online CA Backup (SQL Database)
-
Key Protection in HSM
-
Device Certificates for Mobile Platforms, IoT, and Automated Industrial Machinery
-
Automated Certification Authorities
-
Custom Algorithms and Policies
-
Cryptographic Accelerators and Hardware Devices
-
Basic Constraints, Name Constraints
- X.509, PKCS#10, PKCS#7/CMS, S/MIME, PKCS#12, CRL
- RSA, EC (Elliptic curves)
- SHA-2, SHA-1
- OCSP, NDES/SCEP, Kerberos, Timestamp (RFC 3161)
-
HSM / Smart cards
-
PKCS#11 (Cryptoki)
-
Minidriver (Smart Card Minidriver Specification)
-
TokenD
-
Card management / PIN management
-
Smart card readers: CCID, PC/SC, Secure PIN Entry
Security systems based on X.509 certificates
- Authentication
- Smartcard Logon (two-factor authentication)
- Electronic Signature and Non-repudiation
- Electronic Seal
- Data Encryption and Protection (EFS, S/MIME, HTTPS,…)
PKI and Certification Authorities
-
Design of Certification Authority Hierarchies
-
Role and Permission Management
-
Active Directory Certificate Services (PKI based on Microsoft Windows Server)
-
Key Archiving and Recovery
-
OCSP, NDES, CDP, AIA
-
Online CA Backup (SQL Database)
-
Key Protection in HSM
Specialized Certification Authorities
-
Device Certificates for Mobile Platforms, IoT, and Automated Industrial Machinery
-
Automated Certification Authorities
-
Custom Algorithms and Policies
-
Cryptographic Accelerators and Hardware Devices
-
Basic Constraints, Name Constraints
Interoperability Based on Established Standards
- X.509, PKCS#10, PKCS#7/CMS, S/MIME, PKCS#12, CRL
- RSA, EC (Elliptic curves)
- SHA-2, SHA-1
- OCSP, NDES/SCEP, Kerberos, Timestamp (RFC 3161)
Hardware Devices for Personal Key Protection
-
HSM / Smart cards
-
PKCS#11 (Cryptoki)
-
Minidriver (Smart Card Minidriver Specification)
-
TokenD
-
Card management / PIN management
-
Smart card readers: CCID, PC/SC, Secure PIN Entry