Blockchain Security with nCipher

Blockchain network participants require assurance that each user is authenticated and each transaction is valid

Blockchain technology represents significant new opportunities to transform the way data is shared and value is transferred, but along with its benefits come new challenges. One of the primary roadblocks to blockchain’s broader adoption is the resolution of a critical issue: security.

As organizations continue to find new and innovative use cases for blockchain, security must be kept top of mind. Only by establishing that each user is an authorized participant of a distributed ledger, and that each transaction submitted to the blockchain is digitally signed, can we advance our use of this transformative technology and reap the rewards it promises.

nCipher eSecurity can help your organization secure its digital transformation and confidently use blockchain through strong authentication, digital signatures, hardened security for root keys and more.


Authenticating Participants
Before individuals are allowed to participate in a distributed ledger, they must be authenticated using highly secure methods.

Trusting Transactions
Participants of a network need assurance that each transaction can be trusted. Otherwise, trust in the network itself will be in question.

Securing the Keys
While blockchain technology itself has proved tamper-resistant, cryptographic keys are essential to secure access to a distributed network and ensure transactions are valid. These keys can become vulnerable and stolen via network breaches, as seen in the attacks on cryptocurrency exchanges in recent years.


Strong Authentication
Similar to banking and other industries, establishing trust in a blockchain network depends on strong authentication of participating users and devices, underpinned by cryptographic processes. Organizations worldwide rely on nCipher nShield HSMs as the foundation of their high-assurance user authentication methods.

Digital Signatures
Transactions submitted to the blockchain are digitally signed using a private key to confirm that the entry comes from the user and to prevent any alterations. nCipher nShield HSMs protect the underlying root keys that are used for the issuance and revocation of private keys.

Hardened Security for Root Keys
nCipher nShield HSMs provide FIPS-certified, tamper-resistant protection for the root keys that underpin network user authentication and transaction validation. Field-proven nShield HSMs are available in a range of form-factors and performance levels to suit particular environments.


Delivering the Root of Trust
nCipher HSMs provide a strong root of trust for the keys and cryptographic operations that enable organizations to build, deploy, and operate blockchain-based transaction networks with confidence.

nShield HSMs provide leading protection for root keys that fulfills even the most stringent security requirements.

nShield HSMs can be clustered for greater performance and availability, enabling the scalability of blockchain operations without sacrificing security.

Stronger Compliance
nShield HSMs meet FIPS 140-2 Level 3 and Common Criteria EAL 4+ certifications, meaning organizations in highly regulated environments can execute on blockchain strategies while satisfying compliance requirements.


January 28, 2019
At the two-day event, which focuses on the topics of football, eSports, sports mix, media, Venue & Events and sports tech & digital, we will be presenting our solutions in the area of wallet, digitalisation and cash register systems (POS) together with Lufthansa Industry Solutions.
Read more
January 17, 2019
Our latest cooperation with the BehavioSec’s Behavioral Biometrics Platform enhances security by invisibly authenticating individuals according to unique online behaviors nearly impossible to impersonate with malicious code, like how a mobile device is held in the hand, touchscreen inputs, cursor and mouse movements and physical time and location data. Integrating with risk scoring systems, BehavioSec’s real-time analysis of these and other metrics power a new line of defense blocking suspicious activities or triggering additional monitoring - without impacting productivity and the user experience.
Read more
January 8, 2019
Anyone selling software protects their products, internal designs and customers with digital certificates - as well as the value of their own brand. Indirectly, this also boost sales: Customers tend to download and install software more frequently, when a trusted manufacturer certificate is displayed. Modern operating systems (Windows and Mac) also explicitly warn against the installation of software without or with insufficiently verified certificates. End users and professional developers appreciate trusted certificates that promise the authenticity of applications.
Read more

Contact | 


+41 58 311 1000



Headquarters Zürich

Ergonomics AG | Nordstrasse 15 | CH-8006 Zürich | Switzerland