Skip to content
Shield What Knows You Best. Introducing the industry’s first security chip with hardware post-quantum cryptography (PQC), safeguarding your most important data against quantum computing threats. Shield What Knows You Best. Introducing the industry’s first security chip with hardware post-quantum cryptography (PQC), safeguarding your most important data against quantum computing threats. Shield What Knows You Best. Introducing the industry’s first security chip with hardware post-quantum cryptography (PQC), safeguarding your most important data against quantum computing threats.
A futuristic digital illustration of an atom symbol overlaid on a glowing globe.
Quantum-Ready Security Quantum-Ready Security Quantum-Ready Security

The S3SSE2A enables independent security processing and data storage, providing a safer security environment regardless of the application processor. Furthermore, as the industry’s first security chip equipped with hardware post-quantum cryptography (PQC), it strengthens quantum resistance by implementing a module lattice-based algorithm optimized for PQC operations in hardware. This allows it to achieve processing speeds up to 17 times¹ faster than software-only solutions, delivering robust protection optimized for the quantum era.

The S3SSE2A enables independent security processing and data storage, providing a safer security environment regardless of the application processor. Furthermore, as the industry’s first security chip equipped with hardware post-quantum cryptography (PQC), it strengthens quantum resistance by implementing a module lattice-based algorithm optimized for PQC operations in hardware. This allows it to achieve processing speeds up to 17 times¹ faster than software-only solutions, delivering robust protection optimized for the quantum era.

The S3SSE2A enables independent security processing and data storage, providing a safer security environment regardless of the application processor. Furthermore, as the industry’s first security chip equipped with hardware post-quantum cryptography (PQC), it strengthens quantum resistance by implementing a module lattice-based algorithm optimized for PQC operations in hardware. This allows it to achieve processing speeds up to 17 times¹ faster than software-only solutions, delivering robust protection optimized for the quantum era.

Your Turnkey Defense Your Turnkey Defense Your Turnkey Defense

The S3SSE2A is a secure element (SE) turnkey solution that integrates hardware and software for comprehensive protection. Hackers target both layers using side-channel attacks², hardware reverse engineering attacks³, and fault injection attacks⁴ to steal sensitive data such as encryption keys. Thanks to its integrated protection, the S3SSE2A is designed to robustly defend against a broad spectrum of evolving security threats and sophisticated attack methods.

The S3SSE2A is a secure element (SE) turnkey solution that integrates hardware and software for comprehensive protection. Hackers target both layers using side-channel attacks², hardware reverse engineering attacks³, and fault injection attacks⁴ to steal sensitive data such as encryption keys. Thanks to its integrated protection, the S3SSE2A is designed to robustly defend against a broad spectrum of evolving security threats and sophisticated attack methods.

The S3SSE2A is a secure element (SE) turnkey solution that integrates hardware and software for comprehensive protection. Hackers target both layers using side-channel attacks², hardware reverse engineering attacks³, and fault injection attacks⁴ to steal sensitive data such as encryption keys. Thanks to its integrated protection, the S3SSE2A is designed to robustly defend against a broad spectrum of evolving security threats and sophisticated attack methods.

A close-up image of a Samsung SE security chip mounted on a motherboard, with a shield and lock icon symbolizing hardware-level data protection.

Specifications

1) Based on ML_DSA65 signature of FIPS 204, with software only being 335.97ms and hardware and software being 19.02ms (200MHz).
2) Side-channel attacks extract electronic signature encryption keys by analyzing power consumption and electromagnetic signals generated during the execution of signature algorithms for user authentication on devices.
3) Hardware reverse engineering refers to the process of physically dismantling the hardware to analyze its internal design, functionality, and structure, often with the intent of uncovering sensitive information such as encryption keys, proprietary algorithms, or access routes to back-end systems.
4) Fault injection attacks intentionally introduce errors—such as bit flips, skipped or repeated operations—into a system to disrupt normal behavior, with the goal of bypassing security mechanisms and compromising critical security-enforcing data.
* All functionality, features, specifications and other product information provided in this document including, but not limited to, the benefits, components, performance, availability, and capabilities of the product are subject to change without notice or obligation.
* All product specifications reflect internal test results and are subject to variations by user’s system configuration. Actual performance may vary depending on use conditions and environment.
* All the depicted devices and features are fictitious creations. No simulation of any real product is intended.
* All images shown are provided for illustrative purposes only and may not be an exact representation of the product or images captured with the product. All images are digitally edited, modified, or enhanced.
* Samsung reserves the right to change images and specifications at any time without notice. Measurements are approximate. All data were deemed correct at time of creation. Samsung is not liable for errors or omissions.