AN12436 SE050 Configurations
AN12436 SE050 Configurations
SE050 configurations
Rev. 2.2 — 22 August 2022 Application note
543822
Document information
Information Content
Keywords SE050
Abstract Definition of available SE050 configurations
NXP Semiconductors
AN12436
SE050 configurations
Revision history
Revision history
Revision Date Description
number
2.2 20220822 • Update Section 1
• Update Section 2
2.1 20220421 • Add Section 3.13.
• Add Section 3.14.
2.0 20220328 • Update Section 2
• Update Section 3.4
• Update Section 3.2
• Add Section 3.6
• Add Section 3.3
1.9 20211104 • Add Section 3.11.5.1
1.8.2 20210902 • Add hexadecimal format of Platform build ID in the FIPS certificate in Section 2.1
1.8.1 20210721 • Added section Product Information in Section 1
• Added Product Information for SE050F in Section 2.1
1.8 20210628 • Add variant SE050F2 in Section 2, Section 3.4, Section 3.2, Section 3.11.4,
Section 3.11.5
• Add Section 3.7
• Adapt Section 2.1
1.7 20210412 • Add Section 2.1
1.6 20210330 • updated Section 3.8
• updated Section 3.9
• updated Section 3.10
1.5 20201216 • updated legal disclaimer
• updated Table 1
• add Section 3.11
1.4 20200827 • Added section Section 3.5
• Minor changes
1.3 20200708 added variant SE050D2 in
• Table 1
• Section 3.8
update key description in Table 4
1.2 20200227 added Section 3.11.1
1.1 20191127 updated Table 6
1.0 20191011 Initial release
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
Abbreviations
Abbreviations
Acronym Description
AES Advanced Encryption Standard
CL Contactless
CMAC Cipher-based Message Authentication Code
DES Digital Encryption Standard
ECC Elliptic Curve Cryptography
ECDSA Elliptic Curve Digital Signature Algorithm
ECDH Elliptic Curve Diffie–Hellman
ECDHE Elliptic Curve Diffie–Hellman ephemeral
EdDSA Edwards Curve Digital Signature Algorithm
HMAC Keyed-Hash Message Authentication Code
2
I C Inter-Integrated Circuit
IoT Internet of Things
JCOP Java Card Open Platform
KDF Key Derivation Function
MAC Message Authentication Code
NIST National Institute for Standards and Technology
OEF Order Entry Form
PSK Pre-Share Key
RSA Rivest-Shamir-Adleman
SCP Secure Channel Protocol
SHA Secure Hash Algorithm
TLS Transport Layer Security
TPM Trusted Platform Module
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
1 Product Information
The SE050 product identification can be obtained out by sending a dedicated command
to the secure element.
The Plug & Trust Middleware (nxp.com) includes a utility called ‘se05x_GetInfo’ to
retrieve detailed product information from the connected SE050 derivative. It is available
as a Windows binary (binaries\ex\VCOM-se05x_GetInfo.exe) and in source code. The
html documentation included with the Plug & Trust Middleware package (section ‘Demo
& Examples’ > ‘SE05X Get Info example’) provides additional information on using and
compiling the utility.
The information retrieved by se05x_GetInfo is a superset of what is required to determine
whether an entry in the errata sheet is applicable to the product.
The exact product identification is covered by two parameters:
• The product OS configuration (Platform build ID) in the format JXXXXXXXXXXXXXXX.
Example below : J3R351021EEE0400
• The product OS Patch ID
Example below : 0000000000000001
• The product ROM ID
Example below: 2E5AD88409C9BADB
• The version of the Applet in the format xx.xx.xx (major.minor.patch). Example below:
3.1.0
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
2 Configuration Table
Table 1. SE050 configuration
SE050E2 SE050F2 SE050A1 SE050B1 SE050C1 OM-SE050
SE050A2 SE050B2 SE050C2 ARD-E
SE050D2 OM-SE050 Dev Kit
ARD Dev Kit
RSA RSA (up to 4096) x (>= 2048 x x
bit) (no
RSA plain)
Supported NIST (192 to 521 x x (>= x x x
Elliptic Curves bit) 224 bit)
Brainpool (160 to x x (>= 224 x x x
512 bit) bit)
Koblitz (160 to 256 x x (>= 224 x x x
bit) bit)
Twisted Edwards x x x
(Ed25519)
Montgomery x x x
(Curve25519)
Montgomery x x
(Curve448)
[Goldilocks]
ECC Crypto ECDSA x x x x x
Schemes
ECDH x x x x
ECDHE x x x x
EdDSA x x x
PAKE
Symmetric 3DES (2K, 3K) x x (only 3K) x x x x
Crypto
AES (128, 192, 256) x x x x x x
Algorithm
AES Modes CBC,CTR, EBC x x x x x x
CCM, GCM x x
Hash Function SHA-1, SHA-224, x x (no x x x x
SHA-256, SHA-384, SHA-1
SHA-512 digital
signature)
MAC HMAC, CMAC x x x x x x
GMAC x x
Key Derivation TLS KDF, TLS PSK x x x x x
(KDF)
MIFARE DESFire x SE050D2 x x
KDF only
Wi-Fi KDF x x x x x
(PBKDF2)
OPC_UA KDF x x x x x
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
For the SE050F Variant the Product Information according to Section 1 is:
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
1
• The product OS configuration (Platform build ID): J3R3510264571100
• The product OS Patch ID: 0000000000000001
• The product ROM ID: 2E5AD88409C9BADB
• The version of the Applet (major.minor.patch): 3.6.0
In order to use the SE050F, NXP recommends to use the respective user guidelines for
the SE050F [3].
[1] All SE050F2 with variant A77E have date code in year 2021. All the SE050F2 with date code in the year 2022 have the variant identifier A92A.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
Table 5. Default Platform SCP keys for new generation of SE050 products
Configuration OEF ID ENC MAC DEK
Table 6. Default Platform SCP keys for Previous Generation of SE050 Products
Configuration OEF ID ENC MAC DEK
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
3.6 Variant E
Table 8. Variant E
Key name and type Certificate Usage policy Erasable by Identifier
(keys) customer
[1]
(keys)
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000000 (key)
(Authentication Connectivity 0, ECC signed 0xF0000001 (cert)
Key 0), ECC256, Die
Individual
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000002 (key)
(Authentication Connectivity 1, ECC Signed 0xF0000003 (cert)
Key 1), ECC256, Die
Individual
Cloud connection key 0, Cloud Connectivity Default Yes 0xF0000100 (key)
ECC256, Die Individual Certificate 0, ECC 0xF0000101 (cert)
signed
Cloud connection key 1, Cloud Connectivity Default Yes 0xF0000102 (key)
ECC256, Die Individual Certificate 1, ECC 0xF0000103 (cert)
Signed
Root of Trust signing key, Attestation Certificate, Anybody Read and No 0xF0000012 (key)
ECC256, Die Individual (used ECC Signed Attestation 0xF0000013 (cert)
to attest new generated keys)
3.8 Variant A / D
Table 10. Variant A
Key name and type Certificate Usage policy Erasable by Identifier
(keys) customer
[1]
(keys)
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000000 (key)
(Authentication Connectivity 0 0xF0000001 (cert)
Key 0), ECC256, Die
Individual
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000002 (key)
(Authentication Connectivity 1 0xF0000003 (cert)
Key 1), ECC256, Die
Individual
Root of Trust signing key, N/A Anybody Read and No 0xF0000012 (key)
ECC256, Die Individual Attestation
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
3.9 Variant B
Table 11. Variant B
Key name and type Certificate Usage policy Erasable by Identifier
(keys) customer
[1]
(keys)
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000004 (key)
(Authentication Connectivity 0 0xF0000005 (cert)
Key 0), RSA2048, Die
Individual
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000006 (key)
(Authentication Connectivity 1 0xF0000007 (cert)
Key 1), RSA2048, Die
Individual
Root of Trust signing key, N/A Anybody, Read, and No 0xF0000010 (key)
RSA2048, Die Individual Attestation
3.10 Variant C
Table 12. Variant C
Key name and type Certificate Usage policy Erasable by Identifier
(keys) customer
[1]
(keys)
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000000 (key)
(Authentication Connectivity 0, ECC signed 0xF0000001 (cert)
Key 0), ECC256, Die
Individual
Default Connectivity Key Connectivity Certificate Anybody, Read No 0xF0000002 (key)
(Authentication Connectivity 1, ECC Signed 0xF0000003 (cert)
Key 1), ECC256, Die
Individual
Cloud connection key 0, Cloud Connectivity Default Yes 0xF0000110 (key)
RSA2048, Die Individual Certificate 0, RSA 0xF0000111 (cert)
Signed
Cloud connection key 1, Cloud Connectivity Default Yes 0xF0000112 (key)
RSA2048, Die Individual Certificate 1, RSA 0xF0000113 (cert)
Signed
Cloud connection key 0, Cloud Connectivity Default Yes 0xF0000100 (key)
ECC256, Die Individual Certificate 0, ECC 0xF0000101 (cert)
signed
Cloud connection key 1, Cloud Connectivity Default Yes 0xF0000102 (key)
ECC256, Die Individual Certificate 1, ECC 0xF0000103 (cert)
Signed
Root of Trust signing key, Attestation Certificate, Anybody Read and No 0xF0000012 (key)
ECC256, Die Individual (used ECC Signed Attestation 0xF0000013 (cert)
to attest new generated keys)
Root of Trust signing key, Attestation Certificate, Anybody Read and No 0xF0000010 (key)
RSA2048, Die Individual (used RSA Signed Attestation 0xF0000011 (cert)
to attest new generated keys)
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
– SE050C1
– SE050C2
– Development Kit C variant
The underlying signed leaf certificates in the devices have the following ID:
• File: 0xF0000101 (Device individual)
• File: 0xF0000103 (Device individual)
These leaf certificates shall not be trusted. This means, that they should not be used to
establish secure communication nor authenticate a SE050C device.
However, the underlying public keys with the following IDs can be trusted:
• 0xF0000100
• 0xF0000102
Furthermore, these product variants contain other die individual certificates which can be
trusted.
The following certificates present in the SE050C configuration can be trusted:
[1] These certificates are also used for the NXP EdgeLock 2GO services. Take this into consideration in case of deletion of
these certificates.
Use a certificate/key from Table 14 different that is than File: 0xF0000101 or File:
0xF0000103 to authenticate the SE050 device, due to the intermediate certificate
revocation mentioned above. After successful authentication, only communication
channels based on one of these certificates shall be trusted and used.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
4 References
[1] SE050 IoT Applet APDU Specification, document number AN12413. Available on
NXP website.
[2] SE050E - User Guidelines, document number AN13483. Available on NXP website.
[3] SE050F - User Guidelines, document number AN13482. Available on Docstore.
[4] SE050 - User Guidelines, document number AN12514, v.1.4. Available on NXP
website.
[5] SE050 - User Guidelines, document number AN12514, v.1.5. Available on
Docstore.
[6] SE051 IoT applet APDU Specification, document number AN12543. Available on
NXP website.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
5 Legal information
5.1 Definitions Terms and conditions of commercial sale — NXP Semiconductors
products are sold subject to the general terms and conditions of commercial
sale, as published at http://www.nxp.com/profile/terms, unless otherwise
Draft — A draft status on a document indicates that the content is still agreed in a valid written individual agreement. In case an individual
under internal review and subject to formal approval, which may result agreement is concluded only the terms and conditions of the respective
in modifications or additions. NXP Semiconductors does not give any agreement shall apply. NXP Semiconductors hereby expressly objects to
representations or warranties as to the accuracy or completeness of applying the customer’s general terms and conditions with regard to the
information included in a draft version of a document and shall have no purchase of NXP Semiconductors products by customer.
liability for the consequences of use of such information.
Export control — This document as well as the item(s) described herein
may be subject to export control regulations. Export might require a prior
5.2 Disclaimers authorization from competent authorities.
Limited warranty and liability — Information in this document is believed Suitability for use in non-automotive qualified products — Unless
to be accurate and reliable. However, NXP Semiconductors does not give this data sheet expressly states that this specific NXP Semiconductors
any representations or warranties, expressed or implied, as to the accuracy product is automotive qualified, the product is not suitable for automotive
or completeness of such information and shall have no liability for the use. It is neither qualified nor tested in accordance with automotive testing
consequences of use of such information. NXP Semiconductors takes no or application requirements. NXP Semiconductors accepts no liability for
responsibility for the content in this document if provided by an information inclusion and/or use of non-automotive qualified products in automotive
source outside of NXP Semiconductors. equipment or applications.
In no event shall NXP Semiconductors be liable for any indirect, incidental, In the event that customer uses the product for design-in and use in
punitive, special or consequential damages (including - without limitation - automotive applications to automotive specifications and standards,
lost profits, lost savings, business interruption, costs related to the removal customer (a) shall use the product without NXP Semiconductors’ warranty
or replacement of any products or rework charges) whether or not such of the product for such automotive applications, use and specifications, and
damages are based on tort (including negligence), warranty, breach of (b) whenever customer uses the product for automotive applications beyond
contract or any other legal theory. NXP Semiconductors’ specifications such use shall be solely at customer’s
own risk, and (c) customer fully indemnifies NXP Semiconductors for any
Notwithstanding any damages that customer might incur for any reason
liability, damages or failed product claims resulting from customer design and
whatsoever, NXP Semiconductors’ aggregate and cumulative liability
use of the product for automotive applications beyond NXP Semiconductors’
towards customer for the products described herein shall be limited in
standard warranty and NXP Semiconductors’ product specifications.
accordance with the Terms and conditions of commercial sale of NXP
Semiconductors.
Evaluation products — This product is provided on an “as is” and “with all
faults” basis for evaluation purposes only. NXP Semiconductors, its affiliates
Right to make changes — NXP Semiconductors reserves the right to
and their suppliers expressly disclaim all warranties, whether express,
make changes to information published in this document, including without
implied or statutory, including but not limited to the implied warranties of non-
limitation specifications and product descriptions, at any time and without
infringement, merchantability and fitness for a particular purpose. The entire
notice. This document supersedes and replaces all information supplied prior
risk as to the quality, or arising out of the use or performance, of this product
to the publication hereof.
remains with customer.
In no event shall NXP Semiconductors, its affiliates or their suppliers
Suitability for use — NXP Semiconductors products are not designed,
be liable to customer for any special, indirect, consequential, punitive
authorized or warranted to be suitable for use in life support, life-critical or
or incidental damages (including without limitation damages for loss of
safety-critical systems or equipment, nor in applications where failure or
business, business interruption, loss of use, loss of data or information, and
malfunction of an NXP Semiconductors product can reasonably be expected
the like) arising out the use of or inability to use the product, whether or not
to result in personal injury, death or severe property or environmental
based on tort (including negligence), strict liability, breach of contract, breach
damage. NXP Semiconductors and its suppliers accept no liability for
of warranty or any other theory, even if advised of the possibility of such
inclusion and/or use of NXP Semiconductors products in such equipment or
damages.
applications and therefore such inclusion and/or use is at the customer’s own
risk. Notwithstanding any damages that customer might incur for any reason
whatsoever (including without limitation, all damages referenced above and
Applications — Applications that are described herein for any of these all direct or general damages), the entire liability of NXP Semiconductors,
products are for illustrative purposes only. NXP Semiconductors makes no its affiliates and their suppliers and customer’s exclusive remedy for all of
representation or warranty that such applications will be suitable for the the foregoing shall be limited to actual damages incurred by customer based
specified use without further testing or modification. on reasonable reliance up to the greater of the amount actually paid by
customer for the product or five dollars (US$5.00). The foregoing limitations,
Customers are responsible for the design and operation of their
exclusions and disclaimers shall apply to the maximum extent permitted by
applications and products using NXP Semiconductors products, and NXP
applicable law, even if any remedy fails of its essential purpose.
Semiconductors accepts no liability for any assistance with applications or
customer product design. It is customer’s sole responsibility to determine
Translations — A non-English (translated) version of a document, including
whether the NXP Semiconductors product is suitable and fit for the
the legal information in that document, is for reference only. The English
customer’s applications and products planned, as well as for the planned
version shall prevail in case of any discrepancy between the translated and
application and use of customer’s third party customer(s). Customers should
English versions.
provide appropriate design and operating safeguards to minimize the risks
associated with their applications and products.
NXP Semiconductors does not accept any liability related to any default,
damage, costs or problem which is based on any weakness or default
in the customer’s applications or products, or the application or use by
customer’s third party customer(s). Customer is responsible for doing all
necessary testing for the customer’s applications and products using NXP
Semiconductors products in order to avoid a default of the applications
and the products or of the application or use by customer’s third party
customer(s). NXP does not accept any liability in this respect.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
Tables
Tab. 1. SE050 configuration .......................................... 7 Tab. 8. Variant E ..........................................................12
Tab. 2. Variant identifiers .............................................10 Tab. 9. Variant F ..........................................................12
Tab. 3. Variant Specific Documentation ...................... 10 Tab. 10. Variant A ..........................................................13
Tab. 4. Common keys ................................................. 11 Tab. 11. Variant B ..........................................................14
Tab. 5. Default Platform SCP keys for new Tab. 12. Variant C ......................................................... 14
generation of SE050 products .........................11 Tab. 13. SE050 variants ................................................16
Tab. 6. Default Platform SCP keys for Previous Tab. 14. SE050C trusted certificate .............................. 16
Generation of SE050 Products ....................... 11 Tab. 15. Secure objects configuration ........................... 18
Tab. 7. NXP reserved keys ......................................... 11 Tab. 16. Content of Certificate Binary File .................... 19
AN12436 All information provided in this document is subject to legal disclaimers. © 2022 NXP B.V. All rights reserved.
Contents
1 Product Information ............................................4
2 Configuration Table ............................................ 7
2.1 SE050F Configuration - FIPS Certified .............. 8
3 SE050 – pre-configuration for ease of use
– Plug & Trust ................................................... 10
3.1 General description ..........................................10
3.2 Variant identifier ............................................... 10
3.3 Variant Specific Documentation ....................... 10
3.4 Common keys ..................................................11
3.4.1 NXP reserved keys ..........................................11
3.5 Applet version ..................................................12
3.6 Variant E .......................................................... 12
3.7 FIPS Variant F ................................................. 12
3.8 Variant A / D .................................................... 13
3.9 Variant B .......................................................... 14
3.10 Variant C ..........................................................14
3.11 SE050 Chain of trust certificates ..................... 15
3.11.1 Iot Connectivity ................................................ 15
3.11.2 Attestation RSA ............................................... 15
3.11.3 Attestation ECC ............................................... 15
3.11.4 Cloud Onboarding RSA ................................... 15
3.11.5 Cloud Onboarding ECC ...................................15
3.11.5.1 SE050 certificates revocation .......................... 16
3.12 SE050 Chain of Trust for EdDSA
certificates ........................................................16
3.12.1 Cloud Onboarding Ed25519 ............................ 17
3.12.2 Attestation Ed25519 ........................................ 17
3.13 Secure objects configuration ........................... 18
3.14 X.509 Certificate Storage encoding ................. 19
4 References ......................................................... 21
5 Legal information .............................................. 22
Please be aware that important notices concerning this document and the product(s)
described herein, have been included in section 'Legal information'.