Just curious what microcontrollers are used in nitrokeys (nitrokey passkey) and if we are impacted in anyway?
" The cryptographic flaw, known as a side channel, resides in a small microcontroller used in a large number of other authentication devices, including smartcards used in banking, electronic passports, and the accessing of secure areas. While the researchers have confirmed all YubiKey 5 series models can be cloned, they haven’t tested other devices using the microcontroller, such as the SLE78 made by Infineon and successor microcontrollers known as the Infineon Optiga Trust M and the Infineon Optiga TPM. The researchers suspect that any device using any of these three microcontrollers and the Infineon cryptographic library contains the same vulnerability."
The secure element of Nitrokey 3 is a SE050 from NXP. The main MCU is either a NRF52 or LPC55S6x type processor.
Nitrokey passkey is based on the Nitrokey 3 platform.
Basic MCU shared for multiple Nitrokey types (Pro, Start, HSM) that is used e.g. as card reader is the STM32F103R8T6 (for interacting with the secure element on a smartcard). The Nitrokey Start does not hold a separate smartcard.
The smartcard in the HSM were once based on A700x from NXP (around 2017) and are now most likely using similar successor chips that offer a JCOP Javacard runtime and are considered current by the vendor.
AFAIK, the implementation of mod_inv (which is used for ECDSA on
secp256k1) in Gnuk is OK if MCU core is not good enough with dynamic
branch prediction. If it’s not the case, we will be able to use
safegcd256 for secp256k1, since code is there.