Skip to main content

SimpleGo Security Architecture - Hardware Class 1

Attack Equipment Economics

Document version: Session 44 | March 2026 Copyright: 2025-2026 Sascha Daemgen, IT and More Systems, Recklinghausen License: AGPL-3.0 (Software) | CERN-OHL-W-2.0 (Hardware)


Why This Document Exists

Security claims without cost context are meaningless. Saying "requires physical access and laboratory equipment" could mean anything from a $15 SPI reader to a $400,000 certification lab. This document provides concrete, verifiable price points for every tool referenced in SimpleGo's threat model, enabling users, investors, and security researchers to make their own informed assessment of SimpleGo Class 1's practical security level.

All prices are based on publicly available retail listings, published research papers, and manufacturer product pages as of early 2026. Where exact prices are unavailable, ranges are given with sources noted.


The Baseline: Attacking SimpleGo WITHOUT the Vault

Before the HMAC vault is enabled (Mode 1, current Alpha state), attacking SimpleGo's stored keys requires:

ItemPriceSource
CH341A USB SPI flash programmer$5-15AliExpress, Amazon
SOIC-8 test clip (no desoldering needed)$3-8AliExpress
flashrom or esptool.py softwareFreeOpen source

Total: $8-23. Time: 5 minutes. Skill: Beginner.

The attacker clips onto the SPI flash chip, runs esptool.py read_flash, and dumps the entire NVS partition in plaintext. All ratchet keys, queue keys, handshake state, and WiFi credentials are immediately readable. No specialized knowledge required - there are YouTube tutorials.

This is the attack that the HMAC vault (Mode 2) is specifically designed to prevent.


Attacking SimpleGo WITH the Vault: Four Tiers of Equipment

Tier 1: Hobbyist / Student ($400-600)

The minimum viable setup for electromagnetic fault injection experiments. Not sufficient for reliable key extraction from ESP32-S3, but capable of learning the techniques and potentially achieving results with significant time investment.

ItemModelPricePurpose
EMFI toolPicoEMP (DIY from open-source design)$50-60EM pulse generation, 310V fixed
EMFI tool (alt)Electronic Cats Faulty Cat v2.1$120EMFI + voltage glitch + SWD/JTAG detect
Capture boardChipWhisperer-Nano$250Basic power analysis, 10-bit ADC
Target boards5x ESP32-S3-DevKitC$50Practice and parameter tuning
AccessoriesProbes, wires, clips$30-50Physical connections

Total: $400-530

Capabilities: Basic EMFI experiments. Simple Power Analysis (SPA) to observe gross power patterns. Cannot perform high-resolution CPA needed for AES key extraction (ADC resolution and sample rate too low). Suitable for learning, not for production attacks against ESP32 security features.

Time to extract ESP32-S3 HMAC key: Unknown. Likely impossible with this equipment due to insufficient measurement resolution. PicoEMP has demonstrated successful fault injection against simpler targets but published ESP32 attacks used more capable equipment.

Tier 2: Security Researcher ($1,600-5,000)

The setup that could realistically reproduce the Ledger Donjon CPA attack against ESP32 AES hardware, with patience.

ItemModelPricePurpose
Capture + glitchChipWhisperer-Husky$500-70012-bit ADC, 200 MS/s, clock glitching
OscilloscopePicoScope 3206D (200 MHz)$700-900Timing analysis, trigger setup
EMFI injectorPicoEMP or SiliconToaster (DIY)$50-150EM pulse generation
PositioningCNC 3018 Pro (modified for probe)$200-300XYZ automated probe positioning
Target boards10x ESP32-S3-DevKitC$100Parameter optimization
Analysis softwareChipWhisperer + Lascar (open source)FreeCPA computation, trace analysis
EM probe setCustom ferrite-core probes, 0.5-2mm$50-100Focused EM injection/measurement
AccessoriesShunt resistors, amplifiers, connectors$100-200Measurement chain

Total: $1,700-2,550 (basic) to $5,000 (with better oscilloscope)

Capabilities: Full Correlation Power Analysis (CPA) against AES operations. ChipWhisperer-Husky's 12-bit ADC at 200 MS/s is sufficient for AES S-box leakage detection. The CNC 3018 enables automated probe positioning for systematic chip surface scanning. Lascar (Ledger Donjon's open-source SCA library) processes 100,000 traces with 10,000 samples each in approximately 25 seconds.

Time to extract ESP32-S3 flash encryption key: If the published Ledger Donjon methodology transfers directly (which is expected per Espressif's advisory), approximately 300,000 traces at maybe 5-10 traces per second means 8-17 hours of measurement collection, plus analysis time. With parameter optimization on practice chips, total project time is days to weeks.

Time to extract ESP32-S3 HMAC key: Unknown. The HMAC peripheral uses SHA-256, not AES. CPA methodology would need adaptation. No published work exists. Estimated: significantly harder, possibly weeks to months if feasible at all with this equipment.

Tier 3: Professional Lab ($10,000-30,000)

The setup used in published ESP32 research papers and by professional hardware security assessment firms.

ItemModelPricePurpose
EMFI platformNewAE ChipSHOUTER (CW520)$3,300-4,000Programmable 0-500V EM injection
OscilloscopeKeysight DSOX3054T (500 MHz, 5 GS/s)$5,000-7,000High-bandwidth power measurement
PositioningChipShover (XYZ with 10um precision)$500-1,000Automated scanning
Positioning (alt)Thorlabs XYZ stage$2,000-10,000Sub-micron precision
Current probeKeysight N2893A or Tektronix CT1$1,000-2,000Low-noise current measurement
Analysis platformChipWhisperer-Pro or custom$1,000-3,000High-speed capture and streaming
Target boards50x ESP32-S3-DevKitC$500Extensive parameter exploration
SoftwareChipWhisperer Pro + custom scripts$0-1,000Full SCA toolchain

Total: $13,300-28,000

Capabilities: Everything in Tier 2, plus: higher measurement bandwidth allows capturing faster transients, programmable EM pulse voltage enables fine-tuning for specific chip specimens, higher trace collection rate (hundreds per second with streaming), and the ability to characterize the HMAC peripheral's power signature with sufficient resolution to develop novel SHA-256 CPA attacks.

This is the equipment class used by Ledger Donjon (Tektronix MSO54 oscilloscope), Raelize (Riscure EM-FI probe), and Delvaux/TII (Teledyne LeCroy WavePro 804HD) in their published ESP32 research.

Time to extract ESP32-S3 flash encryption key: Hours (established methodology). Time to extract ESP32-S3 HMAC key: Days to weeks (novel research required, but equipment is sufficient).

Tier 4: Certification Lab ($100,000-400,000+)

Equipment used for Common Criteria, EMVCo, and FIPS certification testing. This is what evaluates the Secure Elements planned for Hardware Class 2 and 3.

ItemModelPricePurpose
SCA platformKeysight Inspector SC4 (ex-Riscure)$20,000-100,000+Industry-standard evaluation
Laser FIAlphaNov/esDynamic LFI station$50,000-200,000Transistor-level fault injection
OscilloscopeKeysight UXR (110 GHz) or similar$15,000-40,000Maximum bandwidth capture
EM probe stationCustom with shielded chamber$5,000-20,000Controlled EM environment
DecapsulationChemical + plasma etcher$10,000-30,000Die exposure for laser/probing
Microprobe stationCascade or similar$50,000-100,000+Direct die contact probing

Total: $150,000-490,000+

Capabilities: Everything above, plus: laser fault injection at individual transistor level, die-level probing after chemical decapsulation, thermal analysis, photon emission analysis. This is the equipment needed to attack dedicated Secure Elements like the ATECC608B, OPTIGA Trust M, and SE050 planned for SimpleGo Hardware Class 2 and 3.

Relevance to SimpleGo Class 1: Massive overkill. A Tier 2 or 3 setup is sufficient to attack ESP32-S3 eFuse-based security. This tier is relevant only as context for understanding what it takes to attack the dedicated Secure Elements in higher hardware classes.


The Most Important Number: Cost Ratio

Attack TargetEquipment CostWhat You Get
SimpleGo Mode 1 (no vault)$15ALL keys from ALL contacts, plaintext
SimpleGo Mode 2 (HMAC vault)$2,000-5,000Keys from ONE device only, days of work
SimpleGo Mode 3 (+ Flash Enc.)$2,000-5,000Keys + firmware from ONE device, days of work
SimpleGo Mode 4 (+ Secure Boot)$10,000-30,000Keys from ONE device, needs novel EMFI to bypass boot
SimpleGo Class 2 (single SE)$30,000-100,000Requires SE-specific research, weeks to months
SimpleGo Class 3 (triple SE)$200,000+Must break 3 independent SEs from 3 vendors

The vault (Mode 2) raises the cost of attack by a factor of 130-330x and limits the blast radius from "all contacts" to "one device." This is the core value proposition of Hardware Class 1 security: transforming a trivial $15 attack into a multi-thousand-dollar research project that yields information about exactly one device.


Practice Requirements: The Hidden Cost

Published papers do not emphasize the skill development time, but it is substantial. Side-channel analysis and fault injection are not plug-and-play tools. The attacker must:

Learn the theory. CPA requires understanding of statistical correlation, Hamming weight models, and AES internals. This is graduate-level cryptography and electrical engineering. Textbooks, courses, and months of study for someone starting from zero.

Practice on known targets. The ChipWhisperer ecosystem provides tutorial targets (CW308 boards) for practicing CPA against known AES implementations with known keys. Getting a first successful key extraction on a tutorial target typically takes days of setup and experimentation. Progressing from tutorial targets to real-world ESP32 targets requires adapting probing techniques, trigger timing, and analysis parameters.

Optimize for the specific target. Every individual chip specimen has slightly different characteristics (manufacturing variation, board layout, bypass capacitor placement). Parameters that work on one ESP32 board may need adjustment for another. The published papers report "optimized" results - they do not report the hours of parameter tuning that preceded the successful extraction.

A realistic estimate for a skilled hardware security researcher attacking a SimpleGo Mode 2 device for the first time: 1-2 weeks including equipment setup, parameter optimization on practice chips, trace collection, and analysis. For a graduate student learning the techniques from scratch: months.


Open-Source Attack Tools

The democratization of hardware security research means the knowledge barrier is lowering over time. All major tools have open-source implementations:

ToolDeveloperLicensePurpose
ChipWhispererNewAE TechnologyGPLv3Full SCA/FI platform with Jupyter notebooks
PicoEMPNewAE TechnologyBSD-3Low-cost EMFI tool, Raspberry Pi Pico based
SiliconToasterLedger DonjonLGPLv3Programmable 0-1000V EM injector
Faulty CatElectronic CatsOpen hardwareEMFI + voltage glitch + debug detection
LascarLedger DonjonLGPLv3CPA/DPA/template attacks, Python library
SCALibSIMPLE-Crypto (UCLouvain)AGPLv3State-of-art evaluation: LDA, SNR, belief propagation
RainbowLedger DonjonLGPLv3Fault injection simulation via Unicorn emulation
findusSySS GmbHOpen sourceEMFI experiment management

The availability of these tools means that the cost barrier is primarily in the measurement hardware (oscilloscopes, probes, positioning), not in the software or methodology. A motivated researcher with $2,000 in hardware and access to published papers has a credible path to attacking ESP32-S3 eFuse security.


Conclusion: Honest Positioning

SimpleGo Hardware Class 1 with the HMAC vault provides strong protection against the most common and accessible attack vector (flash readout) at zero additional hardware cost. It does not provide protection against a determined attacker with $2,000+ in equipment, physical access, and weeks of dedicated effort.

This is the honest truth, and it should be communicated clearly to users. The comparison point is not "is this unbreakable?" (nothing is) but "how much does it cost to break, and what does the attacker get?" For a $50-70 device using a $10 microcontroller, raising the attack cost from $15 to $2,000+ while limiting the result to a single device is a remarkable value proposition. And for users who need more, Hardware Class 2 and 3 exist.


References

SourceDescription
newae.com/productsChipSHOUTER, ChipWhisperer-Husky, PicoEMP pricing
electroniccats.com/storeFaulty Cat v2.1 pricing
github.com/newaetech/chipshouter-picoempPicoEMP open-source design files
github.com/Ledger-Donjon/silicon-toasterSiliconToaster design files
github.com/Ledger-Donjon/lascarLascar SCA library
ledger.com/blog/compact-emLedger Donjon EMFI setup description with CNC pricing
IACR 2022/301"How Practical are Fault Injection Attacks, Really?" (cost survey)
eprint.iacr.org/2023/090Ledger Donjon ESP32-V3 attack equipment description
usenix.org WOOT 2024Delvaux et al. equipment description
courk.ccCourdesses ESP32-C3/C6 attack setup

SimpleGo - IT and More Systems, Recklinghausen First native C implementation of the SimpleX Messaging Protocol AGPL-3.0 (Software) | CERN-OHL-W-2.0 (Hardware)