Security Policy

Security Policy

Infineon Technologies AG CCS ESS Trusted Platform Module 2.0 SLB 9670 FIPS 140-2 Level 2 Non-Proprietary Security Policy Version: 1.01 Date: 21 June 2019 Trusted Platform Module 2.0 SLB 9670 Page 1 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents Table of Contents References .............................................................................................................................................................. 4 Acronyms and Definitions ....................................................................................................................................... 5 1 Overview .......................................................................................................................................................... 6 1.1 Versions, Configurations and Modes of Operation ......................................................................................... 6 1.2 Physical Characteristics and Cryptographic Boundary ..................................................................................... 7 1.3 Operational Environment ................................................................................................................................ 8 1.4 TPM Composition ............................................................................................................................................. 9 2 Cryptographic Functionality ............................................................................................................................ 10 2.1 Critical Security Parameters and Public Keys ................................................................................................. 12 3 Roles, Authentication and Services ................................................................................................................. 14 3.1 TPM Identification and Authentication Methods .......................................................................................... 14 3.2 Services .......................................................................................................................................................... 16 4 Self-tests ......................................................................................................................................................... 20 5 Physical Security Policy ................................................................................................................................... 22 6 Electromagnetic Interference and Compatibility (EMI/EMC) ........................................................................... 22 7 Mitigation of Other Attacks Policy................................................................................................................... 22 8 Security Rules and Guidance ........................................................................................................................... 23 8.1 Requirements for Secure Operation .............................................................................................................. 23 9 Annex A – Module Initialization ...................................................................................................................... 25 10 Annex B – Module Startup .............................................................................................................................. 25 Trusted Platform Module 2.0 SLB 9670 Page 2 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents List of Tables Table 1: References ........................................................................................................................................................... 4 Table 2: Acronyms and Definitions ................................................................................................................................... 5 Table 3: Security Level of Security Requirements ............................................................................................................. 6 Table 4: Configuration Part and Version Numbers ........................................................................................................... 6 Table 5: Types printed on packages .................................................................................................................................. 7 Table 6: Ports and Interfaces ............................................................................................................................................ 8 Table 7: Approved Cryptographic Functions ................................................................................................................... 10 Table 8: Allowed Cryptographic Functions ..................................................................................................................... 11 Table 9: Non-Approved Cryptographic Functions ........................................................................................................... 11 Table 10: Cryptographic Keys and CSPs .......................................................................................................................... 12 Table 11: Public Keys ....................................................................................................................................................... 13 Table 12: Roles Supported by the Module ..................................................................................................................... 14 Table 13: Roles and Required Identification and Authentication ................................................................................... 14 Table 14: Strength of Authentication Mechanisms ........................................................................................................ 15 Table 15: Unauthenticated Services CSP Access ............................................................................................................. 16 Table 16: Utility Support Services CSP Access ................................................................................................................ 17 Table 17: User Authenticated Services CSP Access ......................................................................................................... 18 Table 18: ADMIN (CO) Authenticated Services CSP Access ............................................................................................ 19 Table 19: DUP Authenticated Services CSP Access ......................................................................................................... 19 Table 20: TPM Challenge + Response Authentication and Encryption Services ............................................................. 19 Table 21: TPM Self-Tests ................................................................................................................................................. 20 Table 22: Mitigation of Other Attacks............................................................................................................................. 22 List of Figures Figure 1: TPM 2.0 in package PG-UQFN-32-1 (left: top view; right: bottom view) .......................................................... 7 Figure 2: TPM 2.0 in package PG-VQFN-32-13 (left: top view; right: bottom view) ......................................................... 7 Figure 3: Module Block Diagram ....................................................................................................................................... 9 Document History Version Change Description 0.90 • Initial Version based on TPM2.0 Security Policy for SLB9670,65,60 • Removed all Content/Referenceds to SLB9660,65,LPC and TSSOP Packages and added UQFN Package • Changed Physical Security from 2 to 3 • Updated Self Test Description for Key Load Test 0.91 • Removed SLBSLB9670UQ12 and SLB9670XU12 Table 5 since there will be no TPM1.2 SKU for UQFN- 32 Package 0.92 • Clarified that Sym HMAC Keys can also be written from external • Removed Annex • Added Clarification for Security Guidance 0.93 • Merged Changes from Spring SP 0.94 • Merged Final Changes from Spring SP from UL Review, Included change of operational environment to unmodifiable and added Vendor affirmed CKG Row to Algorithm Table 0.95 • Clarified in Security Guidance when to use Keys with EncryptedDuplication=1 0.96 • Removed NIST SP800-90A Continious Self Test for DRBG_Generate as aligned with UL and discussed internally 0.97 • Minor consistency fixes, formatting and typos 0.98 • Remove that NDRBG is validated according to NIST SP 800-90B • Update reference to FIPS 180-4, Secure Hash Standard (SHS) Trusted Platform Module 2.0 SLB 9670 Page 3 of 25 V1.01, 2019-06-21 FIPS 140-2 Level 2 Security Policy Project Specific Documents 0.99 • Minor corrections in Derive Sym Key (HMAC, KDK) Service and Clarification U-KDK CSP Description 1.00 • Update of Table 7: CAVP cert. number inserted • Table 15 to Table 20 resized to not truncate tables • Update of document version and date including footer 1.01 • Minor update of description in section 1.1 • Minor update of Table 7 • Minor update of Table 21 References Table 1: References Acronym Full Specification Name [FIPS 180-4] NIST, Secure Hash Standard, FIPS Publication 180-4, August 2015 [FIPS 186-4] NIST, Digital Signature Standard (DSS), FIPS Publication 186-4, July 2013 [FIPS140-2] NIST, Security Requirements for Cryptographic Modules, May 25, 2001 [FIPS197] NIST, Advanced Encryption Standard (AES), FIPS Publication

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    25 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us