I.e since the entirety is implementable in a (Turing whole) CPU then how does it subject whether or not a Protected Part has toughen for Bitcoin’s cryptographic primitives – rather then making signing and decryption sooner.
Initially I feel that is moderately a false impression, it is very important have the ability to do ECC operations successfully which is why a theoretical Protected Part (SE) with those features would wish to be environment friendly. On the other hand the purpose of them isn’t to compete with the potency of say a desktop processor, the purpose is to have a verifiably right kind and discrete processor this is environment friendly sufficient do do the operations on a small software.
Would a tool with a generic CPU the place the instrument cannot be modified (with out dropping the secrets and techniques as neatly) with coverage in opposition to bodily assaults already be “the dream {hardware} pockets” which does not toughen key export it doesn’t matter what?
It’s not that i am certain that good playing cards are compatible this description completely, they retailer knowledge and require bodily interplay to free up secrets and techniques however don’t seem to be made for generic CPU processing if that’s what you might be suggesting.
I wish to explain I’m by no means a professional in this subject however from what I’ve researched the explanation a sensible card (SC) isn’t extra safe than a SE is since you are inable to safe non-public key operations at the SC, you’ll handiest use it to retailer the non-public knowledge. The SE having the aptitude for secp256k1 (which it appears none do atm) would will let you do signing utterly airgapped out of your probably inclined or already exploited non-public laptop device or native laptop community. That being stated there are non-secp256k1 comparable non-public operations that may be completed at the SE, which relating to an SC would wish to be carried out to your non-public laptop device which is an greater assault floor.
Ledger for example claims that they use the SE to generate non-public keys:
Protected Part Chip Protects Your Ledger From Assaults
A Protected Part is a extremely complicated chip that mitigates numerous various kinds of assaults. This state of the art chip, which is utilized in high-level safety answers, actually units Ledger aside as a top-end safety answer for crypto belongings. All of our units use a Protected Part, which very much complements their safety. Ledger makes use of them to generate and retailer non-public keys on your crypto belongings.
I don’t suggest the usage of ledger in mild in their fresh press releases alternatively that is an instance of ways a SE may well be used.
Blockstream Jade adopts a distinct safety type now not in line with SE which you’ll to find to be related:
As a substitute of a safe detail, Blockstream Jade makes use of a singular safety type that permits it to stay totally open-source whilst additionally being secure from bodily assaults and attaining identical (if now not higher) safety from this attainable danger – via appearing as a “digital” safe detail.
The blind oracle type that Jade makes use of is totally open supply, and is in reality blind. It is aware of not anything about Jade pockets knowledge, and does not even know the consumer’s precise PIN. Customers might use Blockstream’s blind oracle to give protection to their pockets, or they’ll run their very own.
From what I will surmise, an SE can also be helpful for sure non-public operations similar to producing a key alternatively it does now not shut the assault floor utterly. An SC as it can not do any non-public operations is a extra open assault floor as it delegates non-public operations to any laptop device you plug it into. An open supply blind oracle type is also a great way to lower the assault floor when the usage of a SC or {hardware} with a identical safety type similar to I consider Jade would possibly fall into. On the other hand since all SEs thus far are closed supply it might not be a viable possibility for SE based totally wallets to put into effect blind oracles to give protection to non-public key operations but.