Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

adding basic draft for SE05 specific documentation #358

Draft
wants to merge 5 commits into
base: main
Choose a base branch
from

Conversation

nitrosimon
Copy link
Contributor

fixes #302

source/components/nitrokeys/nitrokey3/SE50.rst Outdated Show resolved Hide resolved
source/components/nitrokeys/nitrokey3/SE50.rst Outdated Show resolved Hide resolved

Activation and Deactivation
---------------------------
The SE550 is enabled by default if no key is already saved on the device. This is automatically the case after reset of the opcard or the whole device. Activating the SE50 will delete all current keys.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Unclear which keys you talk about. FIDO keys? PIV keys?

OPCard is a developer terminology but not expected to be known by users.

The following Elliptic Curve algorithms can only be used with the SE50 enabled:

* NIST P-384
* NIST P-521 (secp256r1/prime256v1, secp384r1/prime384v1, secp521r1/prime521v1)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

different key lengths are mixed.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

taken this from the shop page https://shop.nitrokey.com/shop/nk3cn-nitrokey-3c-nfc-148#attr= maybe we should fix it there too

source/components/nitrokeys/nitrokey3/SE50.rst Outdated Show resolved Hide resolved
@nitrosimon nitrosimon force-pushed the issue302 branch 5 times, most recently from fe2f83d to d2782f6 Compare December 21, 2024 18:31
@jans23 jans23 changed the title adding basic draft for SE50 specific documentation adding basic draft for SE05 specific documentation Dec 23, 2024
The SE05X Secure Element is certified to Common Criteria EAL 6+ security level and includes features like RSA, ECC, AES, and SHA algorithms, making it ideal for the Nitrokey 3.
It usage is optional and provides faster performance and some additional features.

Currently only OpenPGP Card and PIV are using the Secure Element. PIV depends on the Secure Element and does not run without it being enabled and OpenPGP Card can be configured to use the Secure Element or not. Passwords and FIDO2 are not making use of it.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is a bit weird to say "PIV depends on the Secure Element and does not run without it being enabled", since the secure element is always "enabled", it's just not always in use for applications (and it's used for seeding the randomness).

The Secure Element is enabled by default if no key in OpenPGP Card and PIV is already saved on the device.
This is automatically the case after reset of the OpenPGP Card or the whole device. Manually activating the Secure Element for the OpenPGP Card will delete all current keys.

To check whether the Secure Element is activated run:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
To check whether the Secure Element is activated run:
To check whether the Secure Element for the OpenPGP Card is activated run:


The Secure Element `SE050 <https://www.nxp.com/products/SE050>`__ is a tamper-resistant chip by NXP Semiconductors that provides advanced security features. It offers hardware-based security functions including cryptographic operations, secure key storage, and protection against physical and logical attacks. The SE05X Secure Element is certified to Common Criteria EAL 6+ security level and implements algorithms like RSA, ECC, AES, and SHA, making it ideal for the Nitrokey 3.

PIV uses the Secure Element. OpenPGP Card can be configured to use the Secure Element or not in which case a software-only implementation is used. Passwords and FIDO2 don't use the Secure Element, but it is used for specific use cases, like additional randomness.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

... specific use cases, like additional randomness

Which other use cases?

Activation/Deactivation for OpenPGP
-----------------------------------
The Secure Element is enabled by default if no cryptographic key in OpenPGP Card and PIV is already saved on the device.
This is automatically the case after resetting the OpenPGP Card or the whole Nitrokey. Manually activating the Secure Element for the OpenPGP Card will delete all existing keys.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Manually activating the Secure Element for the OpenPGP Card will delete all existing keys.

Better make this a warning block.

+-----------------------------------------+---------------------+------------------------+
| RSA 4096 bit | ✓ | ⨯ |
+-----------------------------------------+---------------------+------------------------+
| ECC 256-521 bit | ✓ | ✓ |
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is ECC exactly? I assume this is covered by the ciphers below already.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

NK3: Add table including supported algorithm depending on configuration (se050 disabled/enabled)
3 participants