Thales HSMs Protect Key Material. The Keys Still Exist.
by Nick Clark | Published March 28, 2026
Thales — through the Luna network HSM line acquired with SafeNet, the payShield payments HSM family acquired with Gemalto, and the CipherTrust data-protection portfolio — operates the most widely deployed hardware-rooted cryptographic estate in the regulated economy. Luna HSMs anchor certificate authorities, code-signing infrastructure, blockchain custodians, and government PKI; payShield secures the global card-payments rails to PCI HSM, FIPS 140-3, and Common Criteria EAL4+; CipherTrust manages keys, secrets, and tokenization across hybrid clouds and is qualified as an eIDAS Qualified Signature Creation Device for EU trust services. The protection these devices provide for stored cryptographic key material is the strongest available in commercial deployment. The structural observation is independent of that quality. Keys protected to FIPS 140-3 Level 3 are still keys: persistent stored artifacts, replicated across high-availability clusters, governed by lifecycle ceremonies, and built on RSA, ECC, and pairing-based primitives whose hardness assumptions a cryptographically relevant quantum computer would demolish. Keyless identity, post-quantum by construction, sits at a different point in the architectural space — not as a replacement for HSMs in their existing roles, but as the identity primitive whose security model does not depend on stored key material continuing to exist or continuing to be hard to derive.
Vendor & Product Reality
Thales's HSM and key-management portfolio is the product of two decades of acquisition and consolidation: nCipher for the European root-of-trust market, SafeNet for the Luna network HSM and authentication assets, Gemalto for the payShield payments HSM and broader digital-security business. The Luna line — Luna Network HSM 7, Luna PCIe HSM 7, Luna USB HSM, Luna Cloud HSM — covers the spectrum from hyperscale data-center deployments to portable signing ceremonies, with FIPS 140-3 Level 3 validation, Common Criteria EAL4+ certification under multiple protection profiles, and qualification as a Qualified Signature/Seal Creation Device under eIDAS. payShield 10K is the dominant payments HSM in the global card-issuing and acquiring infrastructure, certified to PCI HSM v3, FIPS 140-3 Level 3, and bank-mandated regional schemes. CipherTrust Manager, with the CipherTrust Data Security Platform, layers enterprise key management, tokenization, application-layer encryption, and BYOK / HYOK orchestration on top of the HSM root of trust.
The deployment surface is enormous. Public certificate authorities anchor their issuing keys in Luna or equivalent HSMs; the offline root key ceremonies that bootstrap public trust hierarchies are conducted in Faraday-shielded rooms with Luna USB or PCIe modules. Code-signing for Microsoft, Apple, and Linux distribution chains routes through HSMs. Cryptocurrency custodians and tokenized-asset platforms hold customer key material in HSM-backed wallets. Every Visa, Mastercard, and regional card scheme transaction touches a payShield-class HSM at issuer, acquirer, or scheme. National PKI deployments — eIDAS member states, US federal PIV, defense PKIs — use HSMs at every tier. Thales's market position in this estate is dominant, alongside Entrust (the former nCipher franchise), Utimaco, and AWS / Google / Azure cloud HSM offerings that themselves frequently embed Thales hardware.
Architectural Gap
The structural gap is not a critique of HSM engineering. Tamper-resistant hardware that generates keys inside its boundary, never exposes private material to software, and self-zeroizes under attack is exactly what stored-key cryptography needs. The gap is the architectural assumption that identity and authority must be anchored in stored key material at all. Three structural consequences follow from that assumption, and they persist no matter how good the HSM is.
First, the key continues to exist. It was generated inside the HSM and it remains there. Identity bound to the key depends on the continued existence of that key inside that hardware (or its replicas). Physical destruction, certification expiry, or vendor end-of-life of the device threatens the identity unless ceremonial backup procedures have replicated the key elsewhere — which by construction expands the surface of stored copies. Second, availability requirements drive replication. Production deployments cluster HSMs across availability zones and geographic regions, and the same key material is synchronized across multiple physical devices under wrapping protocols. Each replica is a target. The operational complexity of HSM cluster management, key ceremony documentation, hardware refresh cycles, and disaster recovery is itself a security surface, well-understood by every CA and payments operator who lives with it.
Third, and most consequential for the next decade, the cryptographic primitives the keys instantiate are RSA, ECDSA, and ECDH — algorithms whose security rests on the hardness of integer factorization and discrete logarithms in classical computational models. A cryptographically relevant quantum computer running Shor's algorithm reduces those primitives to polynomial-time problems. NIST has finalized the first wave of post-quantum standards (ML-KEM / FIPS 203, ML-DSA / FIPS 204, SLH-DSA / FIPS 205), and Thales — like every HSM vendor — has begun shipping firmware that supports post-quantum algorithms inside the same Luna and payShield enclosures. The migration cliff, however, is real and large: every certificate, every signing key, every long-lived encryption key in the global PKI / HSM estate must be re-issued, re-rooted, and the dependent ecosystems re-validated. The cliff is unavoidable for any identity model that anchors authority in a stored mathematical secret whose quantum resistance is a property of the algorithm rather than the architecture.
What the Primitive Provides
Adaptive Query's keyless-identity primitive is post-quantum by construction, not by algorithm choice. Identity in the primitive is not a stored secret protected by hardware; it is a continuously evolving function of behavioral continuity anchored in locally-sourced unpredictability — entropy that is generated, consumed, and committed forward in time without ever being persisted as a recoverable artifact. There is no key to extract because the security property does not derive from the difficulty of inverting a stored mathematical object. The primitive is therefore independent of the Shor / Grover threat model that bounds the lifetime of every RSA, ECC, and pairing-based deployment in the current HSM estate.
The architectural consequence is qualitative. An identity that does not depend on a stored key does not require the key-management lifecycle: no rotation ceremonies, no replication-across-availability-zones, no PQC migration cliff, no certification-expiry-equals-identity-expiry coupling. The primitive composes naturally with hardware that produces high-quality entropy, but the entropy is a one-time contribution to the evolving identity rather than a stored secret that must be protected for the identity's lifetime.
Composition Pathway
Composition with Thales's portfolio is additive across two axes. On the entropy axis, Luna and payShield HSMs already contain certified hardware random number generators that are some of the most carefully validated in the industry; those generators are an excellent source of the locally-sourced unpredictability the keyless-identity primitive consumes. The HSM contributes entropy to the identity-derivation process without being asked to store the resulting identity, which is a workload the device is well-suited to perform and which extends rather than displaces its existing role. CipherTrust Manager, as the policy and orchestration layer, is a natural integration point for managing the cross-organizational governance of which behavioral-continuity domains a given identity participates in.
On the migration axis, the primitive offers a forward path that does not require ripping out the installed base. Existing HSM-rooted PKI continues to operate for the workloads where stored-key identity is appropriate — code signing, document signing, payments-rail authentication where regulatory frameworks specifically require a key-bound credential. New workloads, and renewal cycles for existing workloads where the regulatory framework permits, can adopt keyless identity without inheriting the PQC migration cliff. Hybrid deployments, where a keyless identity and a stored-key credential co-exist during a transition window, are a natural fit for CipherTrust's existing multi-credential orchestration capabilities.
Commercial & Licensing
Thales's commercial position in the post-quantum decade is strengthened by participating in an identity primitive that is structurally PQC-native rather than waiting for each algorithm migration to complete inside the existing key-bound model. The HSM estate retains its role as the regulated root of trust for the workloads that require one; the keyless-identity primitive is the upgrade path for the workloads where the architectural assumption of stored key material has become a liability rather than a feature. Licensing engagement with Thales, and symmetrically with Entrust, Utimaco, and the cloud HSM operators, is the natural path: the patent positions the primitive at the layer above the HSM, where the customer's identity model lives, rather than competing with the hardware franchise the HSM vendors have spent two decades building.
The regulatory environment is moving in the same direction. NIST's PQC migration guidance under NSM-10, the European Union's PQC roadmap coordinated through ENISA, the UK NCSC's published migration timelines, and the financial-sector deadlines emerging from the Bank for International Settlements all point at the same uncomfortable horizon: the installed PKI / HSM estate must migrate, the migration is multi-year, and any architectural option that reduces the migration surface is commercially valuable. A keyless-identity primitive does not eliminate the need to migrate the workloads that genuinely require key-bound credentials, but it shrinks the population of workloads that must traverse the cliff, and it gives the HSM vendors an aligned story for the renewal cycles where customers are asking "do we re-anchor in a stored key at all?" The answer Thales can offer with the primitive is that for some workloads the right answer is yes and the HSM remains the right hardware, and for others the right answer is no and the HSM contributes entropy to a different identity model. Either way, the customer's purchase order continues to flow.