<img alt="" src="https://secure.weed6tape.com/193471.png" style="display:none;">
Products & Solutions
Products & Solutions
Explore our portfolio of cutting-edge cybersecurity solutions, centered around our flagship hardware security modules (HSMs). From encryption and key management to secure access and authentication, our products ensure robust protection for your most critical data and systems.
About
About
Learn more about our mission, explore career opportunities, and access our resources. Discover how we’re shaping the future of cybersecurity and how you can be part of it.
Contact us
  • There are no suggestions because the search field is empty.

Challenge

Securing the Swiss financial market and ensuring that funds are placed properly pose significant challenges. The IT infrastructure of the Swiss financial marketplace must adhere to the highest security standards to combat ever-growing threats. SIX Interbank Clearing manages the SIC interbank payment system, handling transactions worth around CHF 100 billion daily, along with the settlement of the SIX exchange.

Solution

To address these challenges, Primus S2-Series HSM has been specifically designed for the Swiss Interbank Clearing System operated by SIX SIC under the supervision of the Swiss National Bank.

These models are engineered to accommodate technological advancements and increased security and performance needs, crucial for the Swiss payment system. Primus S2-Series HSMs feature market-leading encryption and authentication performance, along with cryptographic algorithms that are secure against post-quantum computing threats. With this, Securosys and SIX underscore their dedication to fortifying the security and efficiency of Switzerland’s financial system. 

There are three different models available:

  • The S4 Model for entry level performance requirements but without multi-tenant support
  • The S6 Model for medium level performance requirements and with multi-tenant support
  • The S6P Model for high level performance requirements and with multi-tenant support

All models are PQC ready and can be managed by the Decanus Remote Access Management Device.

IMPORTANT INFORMATION REGARDING THE S500 HSM DEVICES

Please note, that the Primus S500 HSMs are no longer available for purchase and need to be exchanged to the current models until June 30, 2026. For detailed Information please refer to the SIC Extranet (Login required).

Key Benefits

API-circle-b&w
Scalability
Flexible partitioning ensures tailored key segregation for specific applications, enhancing management capabilities. Group multiple Primus HSMs for redundancy and load balancing through high availability clustering.
shield-b&w
Enhanced Security
Bolster security with integrated two-factor authentication and tamper protection features, fortifying against unauthorized access and preserving the integrity of sensitive information.
decanus-blocks-b&w
Efficient Remote Administration
Streamline device management securely and effortlessly using the Decanus Terminal.
locket-cyberweb-blocks-b&w
Comprehensive Cryptographic Support
Primus HSMs offer robust support for a wide range of cryptographic functions, including symmetric (AES) and asymmetric encryption (RSA, Diffie-Hellman, ECDSA), as well as hash algorithms (SHA-2, SHA-3), ensuring versatile cryptographic capabilities.
tools-b&w
Simplified Setup Process
User-friendly interface that simplifies setup, commissioning, configuration, and maintenance processes, enhancing operational efficiency.
shield-tools-locket-b&w
Seamless Integration
Seamlessly integrate with built-in high-availability clustering across data centres. Copper and 10Gbps optical interfaces, along with LACP interface bundling, facilitate effortless integration into any network environment
Key Differentiators
X2Front25D_DSC07721-X2cn

SIX-tailored Security

Engineered specifically for SIX, the backbone of the Swiss Interbank Clearing System, the Securosys Primus HSM S2-Series delivers tailored security solutions for Swiss interbank clearing and settlement operations, alongside safeguarding SECOM, the Swiss stock exchange.

Swiss Made

Crafted entirely in Switzerland, Securosys Primus HSMs embody unmatched quality and reliability. Free from external influences, our Swiss-made HSMs guarantee the highest standards from development to production, ensuring unparalleled security solutions.

Use Cases

colourful-background-patterns-4 Securing Swiss Financial Transactions The Primus HSM S2-Series offers industry-leading performance tailored for securing financial transactions. It is ideal for critical operations such as SIC, eSIC, and SECOM transactions, providing robust security through key generation, management, authentication, and encryption tasks.

Technical Specifications

01
Security Features
02
Networking Features
03
Technical Data
01
Security Features
Security Architecture
  • Multi-barrier software and hardware architecture with supervision mechanism
Encryption /
Authentication (extract)
  • 128/192/256-Bit AES
    with GCM-, CTR-, ECB-, CBC-, MAC Mode
  • Camellia, ChaCha20-Poly1305, ECIES
  • RSA 1024-8192, DSA 1024-8192
  • ECDSA 224-521, GF(P) arbitrary curves (NIST, Brainpool, ...)
  • ED25519, Curve25519
  • Diffie-Hellman 1024, 2048, 4096, ECDH
  • SHA-2/SHA-3 (224 - 512), SHA-1, RIPEMED-160, Keccak
  • HMAC, CMAC, GMAC, Poly 1305
  • Post-Quantum Cryptographic (PQC) algorithms CRYSTALS-Dilithium, CRYSTALS-Kyber, SPHINCS+
Key Generation
  • Two hardware true random number generators (TNRG)
  • NIST SP800-90 compatible random number generator
Key Management
  • Key capacity: up to 12 GB
  • 1 partitions @ 240 MB secure storage upgradeable to max. partitions:
     
    S6P 50
    S6 10
    S4 1

     

Operation
  • Number of client connections not restricted

Anti-Tampering Mechanisms
  • Several sensors to detect unauthorized access
  • Active destruction of key material and sensitive data on tamper
  • Transport and multi-year storage tamper protection by digital seal
Attestation and Audit Features
  • Cryptographic evidence of audit relevant parameters (keys, configuration, hardware, states, logs, time-stamping)
Identity-based Authentication
  • Multiple security officers (m out of n)
  • Identification based on smart card and PIN 
02
Networking Features
03
Technical Data