YubiHSM 2, the world’s smallest hardware security module, enhanced with new features to support security for the Public Sector

Compliance mandates require many of our customers in regulated industries or in high-risk environments to prove adequate levels of protection for their data, no matter where it lives or travels. This is why we’ve continued to enhance the capabilities of both the YubiHSM 2 and YubiHSM 2 FIPS, the world’s smallest FIPS-validated and non-FIPS hardware security modules (HSMs). Today, we’re also excited to share that the YubiHSM 2 FIPS now meets FIPS 140-2, Level 3.

While credential theft and phishing attacks continue to skyrocket, so do the number of server-based attacks. Approximately 85% of all data breaches involve human interaction — a fact reinforced by the dizzying array of breaches to hit news headlines last year, not to mention what we expect to see again this year, only accelerated. 

The YubiHSM 2 product lineup delivers advanced protection for certificate authority (CA) keys, database master keys, code signing, authentication/access tokens, manufacturing processes and component authenticity checks, IoT gateways or proxies, file encryption, cryptocurrency exchanges and more. The rise of threats like zero day exploits and malware makes software-based cryptographic key storage increasingly vulnerable for organizations. Alternatively, HSMs offer advanced protection, backed by tamper-resistant hardware, for servers and the cryptographic keys stored within them. 

Why is this important? 

Provides secure hardware protection for cryptographic keys

  • The YubiHSM 2 and YubiHSM 2 FIPS enable secure key storage and operations on tamper-resistant hardware, with audit logging. This prevents accidental copying and distribution of keys, and remote theft of cryptographic software keys. Extensive cryptographic capabilities include: hashing, key wrapping, asymmetric signing, decryption, attestation and more.

Leverages innovative design for flexible use and simple deployment

  • Traditional rack-mounted and card-based HSMs are not practical for many organizations due to their size and deployment complexity. The YubiHSM 2 lineup offers a portable ‘nano’ form factor that allows fast and flexible deployment across diverse environments. It fits easily into a USB-A slot, lying almost flush to remain concealed.

Offers low-cost, high security ROI

  • The YubiHSM 2 FIPS delivers government-grade high cryptographic security and operations at a price point that is up to 90% cheaper than traditional HSMs. Additionally, low-power usage reduces business energy consumption. 

So, what’s new?

With the latest SDK libraries, tools, and the new 2.3.1 firmware just released, roadblocks that prevented YubiHSM 2 products integration with more widely available libraries and operating systems have been removed. This ensures smooth integration with libraries that are used by public sector agencies such as the Department of Defense among others.  

Key new features both versions of the YubiHSM 2 lineup include:

  • Support for Advanced Encryption Standard (AES) in Electronic Code Book (ECB) and Cipher Block Chaining (CBC) modes, for non-FIPS only.
    • AES is one of the most widely used symmetric cryptography algorithms and can be used in several modes such as ECB, CBC, CCM and GCM. Out of these four modes, YubiHSM 2 now supports three most commonly used modes of encryption. 
  • Support for authentication using asymmetric encryption.
    • This feature enables authentication to YubiHSM 2 using Public Key Infrastructure (PKI) where authentication credentials can be stored in a YubiKey enhancing the security of the authentication mechanism. 
  • Support for storing custom information for keys and other objects transparently in YubiHSM 2.
    • Prior to this enhancement, YubiHSM 2 only supported a specified set of information per type of objects. This prevented integration with a few cryptographic libraries that required storing information that did not conform to the template supported by YubiHSM 2. 
    • With this enhancement, information that does not conform to the standard template for keys, can also be stored in YubiHSM 2. This removes the roadblocks that prevented integration of YubiHSM 2 with certain libraries and operating systems. 

For more information on the YubiHSM 2 lineup, please visit the Yubico site. Products are  available for purchase on the Yubico store, through Yubico’s dedicated sales team, or from any Yubico-approved channel partners and resellers

Talk to our teamTalk to our team

Share this article:


  • Piloting Europe’s future ID: Passkeys securing digital walletsOver the last several years, passkeys have become ubiquitous. They are available on every mobile platform, in every leading browser, as part of all major enterprise IAM solutions, and in most major cloud services. Until wwWallet came along, the only place where passkeys hadn’t yet made an impact is in the rapidly developing world of […]Read moredigital identity walletspasskeysSIROSwwWallet
  • We’re excited for what’s to come – meet us in-person to find out whyIt’s been a busy year for our team, filled with exciting company and product updates aimed at better serving our customers and helping them achieve cyber resilience as AI-driven phishing threats continue evolving globally. Between industry award recognitions and key new executive leadership hires to lead Yubico to its next stage of growth and a […]Read more
  • FIPS certified vs. FIPS compliant: What’s the real difference?“Is your MFA solution FIPS compliant, or is it certified?”  This is a question we hear a lot, and for good reason. In industries where security and compliance are critical (especially in government contracts), understanding the difference between FIPS certified and FIPS compliant isn’t just semantics – it can mean the difference between meeting requirements […]Read moreFIPSNIST
  • 2025 Global State of Authentication survey: A world of difference in cybersecurity habitsIn a world that’s more connected than ever, the landscape of cybersecurity threats is constantly evolving. Bad actors, now supercharged with artificial intelligence (AI), are becoming increasingly adept at exploiting human error through sophisticated phishing and social engineering attacks. This makes robust cybersecurity a universal issue, impacting everyone from individuals to the largest global enterprises. […]Read moreGlobal State of Authenticationsurvey