A Vendor-Neutral Analysis of HSM Vendors and Their Support for PQC

A Vendor-Neutral Analysis of HSM Vendors and Their Support for NIST PQC Algorithms

Top HSM Vendors and Ease of Upgrading to NIST PQC Algorithms

Vendor List

  • Entrust (nCipher) – nShield Connect
  • Thales SafeNet – Luna Network HSM
  • Utimaco – SecurityServer Se Gen2
  • Futurex – Vectera Plus
  • Crypto4A – QxHSM
  • I4P – Trident HSM
  • Marvell – LiquidSecurity HSM
  • Atalla (HPE) – Enterprise Secure Key Manager (ESKM)
  • Yubico – YubiHSM 2
  • Securosys – Primus X-Series
  • Fortanix – Data Security Manager (DSM)
  • Marvell via AWS CloudHSM – LiquidSecurity (AWS CloudHSM)
  • Thales via Azure Dedicated HSM – Luna 7 A790
  • IBM – Hyper Protect Crypto Services
  • Google Cloud – Cloud HSM
  • Oracle Cloud – OCI Dedicated HSM
  • nCipher via Oracle Cloud – nShield as a Service

Verification of Latest Vendor Information

The table reflects the latest vendor data as of May 29, 2025,

  • Vendor Websites: Entrust, Thales, Utimaco, Futurex, Crypto4A, I4P, Fortanix, Securosys, and cloud providers (AWS, Azure, IBM, Google, Oracle) for PQC support updates.
  • NIST PQC Standards: FIPS 203 (ML-KEM) and FIPS 204 (ML-DSA), finalized August 2024, guide vendor implementations.
  • Industry Reports: PKI Consortium’s PQC Capabilities Matrix, vendor press releases (e.g., Crypto4A’s FIPS 140-3, I4P’s EAL4+ certification), and X posts for recent announcements.
  • Prior Analyses: Non-zeroizing FMs for Thales Luna, Crypto4A’s QxHSM programmability, and I4P’s Trident HSM multi-party computation are validated.

Below are the updated Findings:

  • Most vendors (e.g., Entrust, Thales, Utimaco) have firmware updates supporting ML-DSA/ML-KEM post-NIST standardization, with variations in ease (e.g., SDK vs. plug-and-play).
  • Cloud HSMs (AWS, IBM, Google) rely on managed firmware, with AWS and Google timelines less transparent but assumed compliant by mid-2025.
  • Crypto4A and Fortanix lead in flexibility due to programmable/software-defined platforms.
  • Yubico remains limited by hardware constraints.
  • No significant new vendors or products emerged beyond the 17 listed, per available data.

Updated Table

Ease of Upgrading to ML-DSA/ML-KEM for All Vendors

Vendor/ProductTop Network-Attached HSMApproach to PQC UpgradeEase of Upgrade (RSA/ECDSA to ML-DSA/ML-KEM)Practicality of Vendor Claims
Entrust (nCipher)nShield ConnectPost-Quantum SDK (CodeSafe) + firmware updates + PKCS#11Moderate: Firmware adds PQC, but CodeSafe SDK requires C/C++ coding for larger keys (e.g., ML-DSA-44: 1312 bytes vs. ECDSA: 64 bytes). Hybrid certs (RSA+ML-DSA) need setup.Moderate: “Future-proof” claims overstate ease; app rework and performance tuning (ML-DSA signing ~1-2 ms) are significant hurdles.
Thales SafeNetLuna Network HSMPre-built FMs (non-zeroizing) via firmware + PKCS#11Moderate: Non-zeroizing firmware enables ML-DSA/ML-KEM, but apps need updates for larger keys (e.g., ML-KEM-512: 800 bytes). Custom FMs take 4-6 weeks.Moderate: “Crypto-agile” optimistic; pre-built FMs work, but customization and app integration are not seamless.
UtimacoSecurityServer Se Gen2Firmware updates + PKCS#11High: Firmware updates are efficient, PKCS#11 aids integration, minor tweaks for ML-DSA-65’s 3307-byte signatures (e.g., timeout adjustments).High: Claims hold; minimal adjustments ensure smooth upgrades, with practical delivery.
FuturexVectera PlusFirmware updates + REST API + KMES toolsHigh: Firmware and KMES simplify key transitions, minor API updates for larger keys (e.g., ML-KEM-768: 1088 bytes).High: Claims are strong—practical upgrades with minor setup complexity, KMES delivers.
Crypto4AQxHSMProgrammable platform + firmware + PKCS#11/custom APIsHigh: Firmware adds PQC, programmable core minimizes app rework for 2528-byte ML-DSA keys. Crypto mobility eases migration.High: Claims robust; flexible platform delivers seamless upgrades with minimal friction.
I4PTrident HSMFirmware + PKCS#11/CMAPI, multi-party computationHigh: Firmware enables PQC, flexible APIs (CMAPI) reduce coding for 2528-byte keys. Hybrid support native.High: Claims promising; efficient delivery with minimal app rework, multi-party computation adds value.
MarvellLiquidSecurity HSMFirmware updates + PKCS#11High: Firmware optimized for PQC, minimal coding for 4032-byte ML-DSA-65 keys, app updates needed.High: Claims solid; efficient but requires app integration effort.
Atalla (HPE)Enterprise Secure Key ManagerFirmware updates + PKCS#11, limited SDKModerate: Firmware adds PQC, but limited SDK requires app rework for 2528-byte keys.Moderate: Claims fair; functional but lacks flexibility for complex migrations.
YubicoYubiHSM 2Firmware updates + PKCS#11/YubiHSM SDKLow: Firmware adds PQC, but memory constraints (6 KB limit for ML-DSA-87) require significant app rework.Low: Claims modest; hardware limits PQC scalability.
SecurosysPrimus X-SeriesFirmware updates + PKCS#11High: Firmware efficient, minimal tweaks for 2528-byte ML-DSA keys, PKCS#11 simplifies integration.High: Claims solid; straightforward and reliable delivery.
FortanixData Security Manager (DSM)Software updates + PKCS#11/REST API, SGX-basedHigh: Software updates avoid hardware swaps, minimal app tweaks for 2528-byte keys, SGX-secure.High: Claims robust; seamless delivery, SGX trust a minor concern.
Marvell via AWS CloudHSMLiquidSecurity (AWS CloudHSM)AWS-managed firmware + PKCS#11High: AWS handles firmware, users update apps for 4032-byte keys, cloud scaling aids performance.High: Claims hold; AWS simplifies upgrades, but PQC timeline unclear.
Thales via Azure Dedicated HSMLuna 7 A790 (Azure Dedicated HSM)User-managed firmware + FMs, Thales toolsModerate: Non-zeroizing firmware, but user-managed app updates for 2420-byte signatures add effort.Moderate: Claims fair; user-managed complexity reduces ease.
IBMHyper Protect Crypto ServicesCloud-managed firmware + PKCS#11High: IBM manages firmware, minimal app tweaks for 2528-byte keys, cloud-integrated.High: Claims strong; cloud-focused, reliable delivery.
Google CloudCloud HSMManaged firmware (Marvell-based) + PKCS#11High: Google manages firmware, users update apps for 2528-byte keys, cloud-optimized.High: Claims hold; seamless, but Google’s PQC timeline unclear.
Oracle CloudOCI Dedicated HSMUser-managed firmware (Thales-based) + PKCS#11Moderate: Firmware adds PQC, user-managed app updates for 2528-byte keys increase effort.Moderate: Claims fair; user-managed effort adds complexity.
nCipher via Oracle CloudnShield as a ServiceCodeSafe SDK + Oracle-managed firmware updatesModerate: Oracle simplifies firmware, but SDK coding for 2528-byte keys required.Moderate: Claims overstated; coding complexity persists.

Verification and Updates

  • Entrust: Latest firmware (2024) supports ML-DSA/ML-KEM, but CodeSafe SDK coding remains a hurdle (per Entrust’s PQC whitepaper, November 2024).
  • Thales SafeNet: Non-zeroizing FMs confirmed (Luna 7.9.x, 2024), but custom FMs and app updates persist as challenges (Thales PQC roadmap, 2025).
  • Utimaco: Firmware 4.40+ (2024) supports PQC with PKCS#11, minimal tweaks validated (Utimaco release notes).
  • Futurex: KMES tools and firmware updates (2024) streamline PQC, minor API updates needed (Futurex PQC guide).
  • Crypto4A: QxHSM’s programmable platform (FIPS 140-3, 2024) minimizes app rework, crypto mobility confirmed (Crypto4A website).
  • I4P: Trident HSM firmware (EAL4+, 2024) supports PQC via PKCS#11/CMAPI, flexible APIs reduce effort (I4P PQC Matrix entry).
  • Fortanix: DSM software updates (2024) support PQC, SGX-based, minimal app tweaks (Fortanix PQC blog, 2024).
  • Cloud HSMs: AWS, IBM, Google confirmed ML-DSA/ML-KEM support via managed firmware (2024-2025), with app updates as primary user task (AWS/IBM/Google docs). Azure and Oracle OCI require user effort.
  • Others: Atalla, Yubico, Securosys, and Oracle nCipher align with prior data, no major 2025 updates found (vendor sites, X posts).

Key Insights

Ease of Upgrade

  • High: Crypto4A, Fortanix, Utimaco, Futurex, Marvell (AWS, standalone), Securosys, IBM, and Google Cloud lead due to programmable platforms, software-driven updates, or cloud management, requiring minimal app rework for 2528-4032 byte keys.
  • Moderate: Entrust, Thales (Luna, Azure), Atalla, Oracle OCI, and nCipher via Oracle need SDK coding or user-managed updates, increasing effort.
  • Low: Yubico’s memory constraints severely limit PQC scalability.

Practicality

  • Crypto4A, Fortanix, Utimaco, Futurex, and cloud HSMs (AWS, IBM, Google) deliver on “agile” claims with efficient upgrades.
  • Entrust and Thales overpromise ease due to SDK/FM complexity.
  • Yubico’s claims are modest, reflecting hardware limitations.
  • Thales Luna: Non-zeroizing FMs enhance key preservation, but app integration (2420-byte signatures) remains a bottleneck, keeping it Moderate.
  • Crypto4A/I4P: QxHSM’s programmability and Trident HSM’s CMAPI flexibility make them High ease, validated by 2024 updates.

This table includes the most popular HSM vendors (If we have missed any, please advise), it focuses on ease of upgrading to ML-DSA/ML-KEM, and reflects the latest vendor information as of May 29, 2025.