Cypherock
  • Introduction
  • Design Decisions
    • The balance between security and convenience
    • Cypherock X1 Hardware architecture
      • Using ultrasonic welding for the X1 Vault enclosure
      • Encrypted NFC communication for X1 cards
      • Using Javacards instead of MicroSD
      • Choosing USB vs QR Code
      • Why the X1 cards are not upgradeable
    • Cypherock is BIP39 compliant
    • Private keys should be near to impossible to extract
    • Conflict between trusted parties should not result in unauthorized access
    • Using Shamir Secret Sharing vs. Multi-sig
      • How is Shamir Secret Sharing implemented within Cypherock X1
      • Why Cypherock has a default 2/5 threshold scheme
      • Rejected Key Schemes
    • PIN Protection on Cypherock X1
      • Difference between backing up your PIN vs. Seed Phrase
  • Security Overview
    • Introduction
    • Keylabs - Third Party Security Audit
    • Remote Attacks
    • Physical Attacks
      • $5 Wrench Attack
      • PIN Brute Force Attack
      • Evil Maid Attack
      • Flashing Malicious Firmware
      • Side Channel Attack
      • Supply Chain Attack
  • Cypherock X1 Features
    • Eliminate messy paper backups
    • Open source with secure elements
    • Use Cypherock as a seed phrase vault
    • All-in-one Portfolio Manager
  • Getting Started
    • Download cySync
    • Import Seed Phrase from existing BIP39 compatible wallet
    • Generate a new wallet with Cypherock X1
    • How Cypherock generates your 24-word seed phrase
    • Best practices in keeping your X1 cards secure
      • Use the protective card sleeves
      • Geographical Seperation
      • Choosing your guardians
    • How do I know I am not locked-in to using only Cypherock X1
    • How do I know my Cypherock X1 is genuine?
      • Email 2FA for Product Authentication
    • How to recover your Crypto assets in the case of loss or theft
    • What happens to my Cypherock X1 if Cypherock goes out of business?
Powered by GitBook
On this page

Was this helpful?

  1. Design Decisions

Cypherock X1 Hardware architecture

PreviousThe balance between security and convenienceNextUsing ultrasonic welding for the X1 Vault enclosure

Last updated 1 year ago

Was this helpful?

Cypherock X1 wallet elements

X1 Vault is designed with a dual-chip architecture in mind. Here STM32L4 acts as the master microcontroller and the secure element (ATECC608A) is used to authenticate the device and secure some of the encryption keys important to X1 Vault's security. The microcontroller has sufficient program memory as required to support code for various coins. The secure element used has measures to prevent various side-channel attacks. The X1 wallet has an OLED display & a 5-way joystick for user input & output.

The X1 Cards on the other hand are tamper-proof passive cards that run a Javacard OS and have a security rating of EAL6+. Our custom proprietary applet runs on top of this secure Javacard OS.

The PN532 is used to communicate between the MCU and the X1 Cards over NFC, it can also support card emulation making it able to communicate with Smartphones over NFC. We have also added a buzzer to provide feedback to the user on the tapping of cards.

Following the latest trends in consumer electronics, the wallet is enabled with a USB type C connector to connect with the desktop.