Security Policy: Java Crypto Module

Security Policy: Java Crypto Module

FIPS 140-2 Non-Proprietary Security Policy: Java Crypto Module FIPS 140-2 Non-Proprietary Security Policy Trend Micro Java Crypto Module Software Version 1.0 Document Version 1.2 August 30, 2018 Prepared For: Prepared By: Trend Micro Inc. SafeLogic Inc. 225 E. John Carpenter Freeway, Suite 1500 530 Lytton Ave, Suite 200 Irving, Texas 75062 Palo Alto, CA 94301 www.trendmicro.com www.safelogic.com Document Version 1.1 © Trend Micro Page 1 of 34 FIPS 140-2 Non-Proprietary Security Policy: Java Crypto Module Abstract This document provides a non-proprietary FIPS 140-2 Security Policy for the Trend Micro Java Crypto Module. Document Version 1.1 © Trend Micro Page 2 of 34 FIPS 140-2 Non-Proprietary Security Policy: Java Crypto Module Table of Contents 1 Introduction .............................................................................................................................................. 5 1.1 About FIPS 140 ............................................................................................................................................. 5 1.2 About this Document .................................................................................................................................... 5 1.3 External Resources ....................................................................................................................................... 5 1.4 Notices .......................................................................................................................................................... 5 2 Trend Micro Java Crypto Module ............................................................................................................... 6 2.1 Cryptographic Module Specification ............................................................................................................ 6 2.1.1 Validation Level Detail ............................................................................................................................. 6 2.1.2 Modes of Operation ................................................................................................................................. 6 2.1.3 Module Configuration .............................................................................................................................. 7 2.1.4 Approved Cryptographic Algorithms ....................................................................................................... 9 2.1.5 Non-Approved Cryptographic Algorithms ............................................................................................. 14 2.1.6 Non-Approved Mode of Operation ....................................................................................................... 14 2.2 Critical Security Parameters and Public Keys ............................................................................................. 16 2.2.1 Critical Security Parameters ................................................................................................................... 16 2.2.2 Public Keys ............................................................................................................................................. 18 2.3 Module Interfaces ...................................................................................................................................... 19 2.4 Roles, Services, and Authentication ........................................................................................................... 20 2.4.1 Assumption of Roles .............................................................................................................................. 20 2.4.2 Services .................................................................................................................................................. 21 2.5 Physical Security ......................................................................................................................................... 25 2.6 Operational Environment ........................................................................................................................... 25 2.6.1 Use of External RNG ............................................................................................................................... 26 2.7 Self-Tests .................................................................................................................................................... 26 2.7.1 Power-Up Self-Tests ............................................................................................................................... 27 2.7.2 Conditional Self-Tests ............................................................................................................................ 28 2.8 Mitigation of Other Attacks ....................................................................................................................... 28 3 Security Rules and Guidance ..................................................................................................................... 30 3.1 Basic Enforcement ...................................................................................................................................... 30 3.1.1 Additional Enforcement with a Java SecurityManager .......................................................................... 30 3.1.2 Basic Guidance ....................................................................................................................................... 30 3.1.3 Enforcement and Guidance for GCM IVs ............................................................................................... 31 3.1.4 Enforcement and Guidance for use of the Approved PBKDF ................................................................ 31 3.1.5 Software Installation .............................................................................................................................. 31 4 References and Acronyms ......................................................................................................................... 32 4.1 References .................................................................................................................................................. 32 4.2 Acronyms .................................................................................................................................................... 33 Document Version 1.1 © Trend Micro Page 3 of 34 FIPS 140-2 Non-Proprietary Security Policy: Java Crypto Module List of Tables Table 1 – Validation Level by FIPS 140-2 Section ........................................................................................................... 6 Table 2 – Available Java Permissions ............................................................................................................................. 8 Table 3 – FIPS-Approved Algorithm Certificates .......................................................................................................... 12 Table 4 – Approved Cryptographic Functions Tested with Vendor Affirmation .......................................................... 13 Table 5 – Non-Approved but Allowed Cryptographic Algorithms ............................................................................... 14 Table 6 – Non-Approved Cryptographic Functions for use in non-FIPS mode only..................................................... 15 Table 7 – Critical Security Parameters ......................................................................................................................... 17 Table 8 – Public Keys ................................................................................................................................................... 18 Table 9 – Logical Interface / Physical Interface Mapping ............................................................................................ 20 Table 10 – Description of Roles ................................................................................................................................... 20 Table 11 – Module Services, Roles, and Descriptions.................................................................................................. 22 Table 12 – CSP Access Rights within Services .............................................................................................................. 25 Table 13 – Power-Up Self-Tests ................................................................................................................................... 28 Table 14 – Conditional Self-Tests ................................................................................................................................. 28 Table 15 – References ................................................................................................................................................. 33 Table 16 – Acronyms and Terms.................................................................................................................................. 34 List of Figures Figure 1 – Module Boundary and Interfaces Diagram ................................................................................................. 19 Document Version 1.1 © Trend Micro Page 4 of 34 FIPS 140-2 Non-Proprietary Security Policy: Java Crypto Module 1 Introduction 1.1 About FIPS 140 Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules specifies requirements for cryptographic

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us