Get expert advice on PKI related software development
Codegic provides expert services on Public Key Infrastructure and related techologies. We have practical development experience in the following PKI domains:
Timestamping, OCSP, SCEP
CA/B Forum Guidelines
PKCS standards, Algorithms
Misc Standards, Common Criteria, Smart Cards, HSM
X509 v3 certificates
ETSI TS 101 861
XAdES-X (Type 2)
Visible Signatures, Invisible Signatures
Certify (Author) Signatures
Adobe® CDS Signatures
PAdES Part 2 (Basic)
PAdES Part 3 (Enhanced)
PAdES Part 4 (Long term)
CMS/PKCS#7/ and S/MIME
ETSI TS 102 778
EN 419 241-2
HSM / Smart Cards
Azure Key Vault
Amazon AWS Cloud HSM
Utimaco (CryptoServer CP5)
RSA – 2048, 4096, 8192
ECDSA – 256, 384, 521
Hashing – SHA1, SHA-256, SHA-384, SHA-512, RIPEMD
Leading companies rely on us for their PKI and digital signature needs
``Our team was not able to handle the AATL needs for our Esign Service, so we researched and found Codegic. They provided a solution that worked in our workflow, and also put us in touch with an AATL certificate provider that was far less expensive than what we had been seeing. Their skills and expertise were obvious regarding AATL and PKI & literally, the project took less than 4 weeks. It was impressive. We would not hesitate to use them again.``
Aaron JonesFounder, SignFast.com
``Codegic team was immensely helpful in bringing our ideas for phone-based PKI authentication and signing to reality. Codegic was absolutely up to the challenge of bringing the security and accountability of our Authenticity Infrastructure's identity certificates to iOS and Android. They gave us secure solutions when it came to advanced digital signatures (CAdES, JSON signing) and WebCrypto. With top quality support, they are a go to shop for any serious PKI / Digital Signature development.``
Wes KussmaulReliable Identities, Inc.
``Security is at the heart of our business. We were struggling with our PKI implementation when Codegic came to the rescue. They not only sorted our technical issues but also designed the whole PKI for the infrastructure. There in depth PKI knowledge down to the code level helped us in many ways. I highly recommend their PKI technical expertise.``
Hemal PatelCEO, Ray Pte. Ltd.
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.