MIRkey Product Info

MIRkey Photo
Openvpn Logo Created with Sketch.
FIDO2 L1 Certified

MIRkey
Product Features and Benefits

The MIRkey is a FIDO2 Security Key, multi-purpose HSM and hardware Bitcoin wallet.
What is a Hardware Security Key? First read what is a Hardware Security Key.
Just need the details? Read the specifications and documentation

Bitcoin Hardware Wallet

Implements the BIP32 Child Key Derivation function.

This allows you to use the MIRkey as a Bitcoin Hardware Wallet with Electrum to keep your Bitcoin keys safe from malicious software and hackers.

Hardware Authenticator

Implements the FIDO2 (U2F/CTAP1 and CTAP2) specification and has support for TOTP (2FA) using the eHSM Manager.

It eases roll-out company wide and enables strong multi factor authentication with most known webservices (like Google, Facebook, GitHub, Amazon etc.) as well as password-less login with Microsoft accounts.

Compatible with existing software

Because it fully implements the PKCS#11 standard, it works out of the box with existing software like Adobe Reader DC (for document signing and encryption), VPN servers and clients (ie. OpenVPN), Webservers (Apache), Database servers (Oracle), OpenSSH, Thunderbird (signing and encrypting emails), Firefox, Disk volume encryption (VeraCrypt), etc.

Multiple standards and API’s

Interfaces via the industry standard PKCS#11 2.40, Microsoft CNG, Java Cryptography Architecture (JCA) and Java Cryptography Extension (JCE). Support for Native libraries on Windows, Linux and Mac OS X.

This eases integration into existing as well as custom applications.

Secure key storage

With MIRkey you can import, create and store cryptographic keys safely. Keys are stored encrypted with master keys in tamper proof silicon that can only be unlocked with the user password. Its hardware and operating system free nature safeguards your keys from being stolen or copied without your knowledge.

This protects your keys from ransomware as well as malware and viruses.

Advanced ciphers

MIRkey supports RSA, ECDSA (with a wide range of elliptic curves), multiple symmetric algorithms (AES, DES3 etc.), HMACs as well as hashing and key wrapping.

This offers flexibility and support for a wide range of operational requirements.

Secure key handling

Cryptographic operations are performed on the MIRkey itself (when unlocked with a user PIN/password) - the keys never leave the secure module.

This prevents access to the keys even when your PC is compromised.

Order