Not just a device. The hardware your security runs on.

Toughkey™ is Lokblok's secure execution environment for Phantom Secrets™, a certified hardware root of trust where keys can be reconstructed, used, and destroyed. It is the anchor hardware for FIDO2 passwordless authentication, and supports standard public/private key generation, Multi-Signature, and Threshold Signature Schemes. Or, more accurately: it's one way to deploy the Lokblok cryptographic runtime.

A certified HSM built to run the Lokblok runtime.

Toughkey™ is a hardware security module (HSM) built to run Phantom Secrets, MPC/TSS, hardware attestation, and secure identity binding, inside a tamper-resistant secure element.

It provides a guaranteed environment where keys can exist briefly, operations can be trusted, and nothing persists after execution.

Keys exist briefly

Reconstructed on demand, never stored

Operations can be trusted

Cryptographically attested execution

Nothing persists

Memory cleared immediately after use

Toughkey™ is not the system. It's the reference hardware.

The Lokblok cryptographic engine

  • Is implemented as secure firmware / applet logic
  • Runs inside trusted execution environments
  • Is hardware-agnostic at the protocol level
  • Executes identically regardless of the hardware it runs on

Toughkey™ is simply

The highest-assurance, purpose-built environment to run it.

One runtime. Multiple deployment boundaries.

The same Lokblok runtime deploys across hardware form factors. The protocol stays identical; only the execution boundary changes.

Secure Elements (SIM / eUICC)

Applet runs directly inside carrier-grade secure elements. No external hardware required. Mass-scale deployment possible. Indistinguishable from Toughkey™ at the protocol level.

Mobile Secure Enclaves

Embedded secure enclaves. Device-bound execution. Consumer-friendly form factors. Hardware-backed security without dedicated hardware.

Enterprise & Cloud HSMs

Hardware-backed execution layers. Integrations with secure infrastructure. Scalable deployment across enterprise systems.

The cryptography stays identical. Only the execution boundary changes.

EnvironmentWhat changesWhat doesn't
Toughkey™ devicePhysical form factorProtocol
SIM / eUICCEmbedded deploymentProtocol
Mobile secure enclaveDevice integrationProtocol
Cloud / enterprise HSMInfrastructure layerProtocol

Because some environments require maximum assurance.

Toughkey™ is the most controlled, auditable, and trusted way to run Phantom Secrets.

FIPS 140-3 Level 3
Common Criteria EAL6+
Tamper-resistant secure element
Hardware attestation

The host system never sees the key.

Key material is reconstructed inside the secure element
Standard public/private key generation supported within the secure element
Operations (sign, decrypt, authenticate) execute internally
Memory is cleared immediately after use
The reconstructed key never exists outside the enclave boundary

Built for execution, not just storage.

Secure Execution

Keys are never exposed to the OS, memory, or network. Operations happen entirely inside the enclave.

Multi-Applet Architecture

Supports Phantom Secrets, FIDO2, standard key generation, Multi-Signature, and Threshold Signature Schemes simultaneously in a single device.

Hardware Attestation

Every operation is tied to a verified, genuine device. Integrity is cryptographically provable.

FIDO2 Passwordless Authentication

Toughkey™ is the anchor hardware for FIDO2. Passwordless authentication backed by a certified secure element. No stored credentials, no phishable secrets.

Multi-Signature Support

Multiple independent signers required before an operation completes. Enforced in hardware. No single party can act unilaterally.

Threshold Signature Schemes

TSS operations execute inside the secure element. A configurable k-of-n quorum must be satisfied before any signature is produced.

Maximum Assurance

FIPS 140-3 Level 3 and Common Criteria EAL6+ certified. The highest-assurance deployment available.

The right environment for maximum assurance.

High-Assurance Enterprise Environments

Regulated industries, financial systems, and critical infrastructure requiring the strongest possible hardware root of trust.

Step-Up Authentication

Physical presence required for high-value actions. The device enforces what policy alone cannot.

Institutional Custody

Hardware-bound governance for digital assets. Multi-party approval flows enforced in the secure element.

Air-Gapped Environments

Maximum isolation, minimum attack surface. Toughkey™ operates where network-connected infrastructure cannot go.

Toughkey™ is the execution layer of the Zero Trust Ecosystem.

Phantom Secrets™defines how keys behave
ToughID™defines who is allowed
Phantom Gate™defines when access happens
Toughkey™enforces it in hardware

Software first, hardware optional. That's everyone else.

Most security products

Software first, hardware optional.

Lokblok

Cryptography first, hardware enforced.

And Toughkey™ is where that enforcement is strongest.

Run it anywhere. Trust it most here.

Toughkey™ is the highest-assurance way to deploy Lokblok's zero-persistence security model. But it's not the only way. And that's exactly the point.