Rosetta USB

The Rosetta USB was a reader-less, key-shaped USB token that provided user authentication, digital signatures, and data privacy in a convenient and portable form factor.

Disclaimer: This is an archive of Spyrus Inc.’s legacy products. Rosetta USB is no longer available; these resources are provided for informational purposes only.

About Spyrus

Spyrus is at the forefront of cybersecurity defense, equipping enterprises with an arsenal of protective measures. From exhaustive security evaluations and ongoing vigilance to aggressive ethical hacking and efficient remedies for ransomware afflictions, we’ve got you covered. With our constant SOC vigilance and bespoke educational initiatives, your personnel will be adept at countering cyber menaces, safeguarding your business’s seamless and secure operation.

About Product

Easy to Use and Manage

  • Universal Serial Bus (USB) compatibility: Simple “plug and play” functionality for effortless setup.
  • No additional hardware required: No separate reader needed, eliminating compatibility concerns and reducing IT burden.
  • Broad software compatibility: Worked seamlessly with popular applications like Netscape Communicator, Microsoft Outlook, and Internet Explorer.

Strong Security

  • FIPS 140-1 Level 2 and 3 certified: Independent third-party validation ensuring adherence to rigorous security standards for maximum user confidence.
  • ITSEC E4 certified processor: High-assurance hardware foundation for enhanced security.
  • SPYRUS Card Operating System (SPYCOS™): A proven and trusted operating system designed for secure applications.
  • Secure storage: A portable vault for protecting private keys, digital signatures, and other sensitive data.

Applications:

  • Electronic Commerce: Increased confidence in online transactions through identity verification for all parties involved.
  • Network Access Control: Enhanced network security and reduced IT costs through auditable authentication, secure logon, and password management.
  • Secure E-mail: Protection of personal or corporate information from unauthorized access.
  • Secure Browsing: Controlled access to websites, safeguarding intellectual property.
  • Digital Rights Management: Secure distribution and protection of digital content online with confidence.

Features:

  • 8-bit processor
  • SPYRUS Card Operating System (SPYCOS™)
  • 32KB ROM
  • 16KB EEPROM
  • 1KB RAM
  • Enhanced ISO Command Shell
  • Security Policy Enforcer
  • SPYCOS Features:
    • Security-centric Memory Manger
    • File Manager
    • Dynamic File and Memory Allocation
    • Modular OS for Processor Portability
  • API:
    • SPEX/ Cryptographic Library
    • Microsoft CryptoAPI
    • PKCS #11
  • Standards:
    • USB v1.1
    • NIST FIPS PUB 46 (DES)
    • NIST FIPS PUB 186 (DSS)
  • Certifications:
    • NIST FIPS PUB 140-1 Level 2 and Level 3
    • ITSEC E4 High Certified Processor
  • Cryptographic Algorithms:
    • Digital Signature – RSA (1024-bit), DSA (1024-bit)
    • Symmetric – DES (ECB, CBC, MAC, Triple)
    • Key Exchange – RSA (1024-bit), Diffie-Hellman
  • Development Environment:
    • CD with drivers
    • SPEX/2 library

Our Services

We safeguard your systems and data so you can focus on your mission. We have security services for the following:

Contact Us

Reach out to us to strengthen your cybersecurity defenses. Our team is ready to assist with audits, penetration testing, and customized security solutions. Get in touch for a free consultation.

Unable to read published form data

The Spyrus Security Insights Blog

Stay ahead of evolving cyber threats. Explore our blog for expert insights, best practices, and the latest news on cybersecurity trends affecting your business.