MIRkey Product Info
MIRkey
Product Features and Benefits
The MIRkey is a
FIDO2 Security Key, multi-purpose
HSM
and hardware Bitcoin wallet.
What is a Hardware Security Key? First read
what is a Hardware Security Key.
Just need the details? Read the
specifications
and documentation
FIDO2 Certification
Bitcoin Hardware Wallet
Implements the BIP32 Child Key Derivation function.
This allows you to use the MIRkey as a Bitcoin Hardware Wallet with Electrum to keep your Bitcoin keys safe from malicious software and hackers.
Hardware Authenticator
Implements the FIDO2 (U2F/CTAP1 and CTAP2) specification and has support for TOTP (2FA) using the eHSM Manager.
It eases roll-out company wide and enables strong multi factor authentication with most known webservices (like Google, Facebook, GitHub, Amazon etc.) as well as password-less login with Microsoft accounts.
Compatible with existing software
Because it fully implements the PKCS#11 standard, it works out of the box with existing software like Adobe Reader DC (for document signing and encryption), VPN servers and clients (ie. OpenVPN), Webservers (Apache), Database servers (Oracle), OpenSSH, Thunderbird (signing and encrypting emails), Firefox, Disk volume encryption (VeraCrypt), etc.
Multiple standards and API’s
Interfaces via the industry standard PKCS#11 2.40, Microsoft CNG, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). Support for Native libraries on Windows, Linux and Mac OS X.
This eases integration into existing as well as custom applications.
Secure key storage
With MIRkey you can import, create and store cryptographic keys safely. Keys are stored encrypted with master keys in tamper proof silicon that can only be unlocked with the user password. Its hardware and operating system free nature safeguards your keys from being stolen or copied without your knowledge.
This protects your keys from ransomware as well as malware and viruses.
Advanced ciphers
MIRkey supports RSA, ECDSA (with a wide range of elliptic curves), multiple symmetric algorithms (AES, DES3 etc.), HMACs as well as hashing and key wrapping.
This offers flexibility and support for a wide range of operational requirements.
Secure key handling
Cryptographic operations are performed on the MIRkey itself (when unlocked with a user PIN/password) - the keys never leave the secure module.
This prevents access to the keys even when your PC is compromised.