A secure element (SE) is a fortified platform, often in the form of microprocessors or memory chips, that provides an advanced level of security for hosting applications and their confidential data. These elements are housed with tamper-resistant designs and may securely store/process cryptographic data according to rules and industry standards. For hardware wallets, secure elements play a pivotal role in safeguarding private keys. By isolating keys within the secure element, hardware wallets provide an additional layer of protection against [[Attack Vectors|wallet attack vectors]]. ### Related Standards or Certifications Wallet manufacturer may aim to comply with globally recognized standards such as Common Criteria (CC) EAL5+, FIPS 140-2/3 Level 3+. Quick overview: - CC EAL5+ Certification: This certification is part of the Common Criteria, an international standard for evaluating the security of IT products. You can learn more about the certification process and requirements on the Common Criteria website: https://www.commoncriteriaportal.org/cc/ - The Federal Information Processing Standards (FIPS) 140-2/3 Level 3+ is a U.S. government computer security standard used to accredit cryptographic modules. The "+" indicates that the module meets additional, more stringent requirements beyond those specified in Level 3. At this level, the cryptographic module must have physical security mechanisms such as tamper-evident seals or pick-resistant locks to prevent unauthorized access. It also requires identity-based authentication and a physical or logical separation between the interfaces by which "critical security parameters" enter and leave the module. ### Memory Usage Secure elements often utilize both volatile and non-volatile memory types depending on the specific requirements. 1. Non-volatile memory is used in secure elements primarily for storing persistent data that must be retained even when power is lost or interrupted. This includes critical information like cryptographic keys, user credentials, or transaction logs. Non-volatile memory provides an advantage here because it can securely store this vital information “offline”, thereby reducing the risk of exposure to online threats. 2. On the other hand, volatile memory within a secure element is typically may be used for temporary storage during processing tasks. For instance, when performing cryptographic operations necessary for authorizing transactions on a blockchain network, intermediate calculations might be stored temporarily in volatile memory.