Apple Inc. Apple Corecrypto User Space Module for Intel (Ccv10) FIPS

Apple Inc. Apple Corecrypto User Space Module for Intel (Ccv10) FIPS

Apple Inc. Apple corecrypto User Space Module for Intel (ccv10) FIPS 140-2 Non-Proprietary Security Policy Module Version 10.0 Prepared for: Apple Inc. One Apple Park Way Cupertino, CA 95014 www.apple.com Prepared by: atsec information security Corp. 9130 Jollyville Road, Suite 260 Austin, TX 78759 www.atsec.com ©2021 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision Table of Contents 1 INTRODUCTION ................................................................................................................. 4 1.1 PURPOSE ............................................................................................................................................ 4 1.2 DOCUMENT ORGANIZATION / COPYRIGHT ............................................................................................... 4 1.3 EXTERNAL RESOURCES / REFERENCES .................................................................................................... 4 1.3.1 Additional References ................................................................................................. 4 1.4 ACRONYMS ......................................................................................................................................... 6 2 CRYPTOGRAPHIC MODULE SPECIFICATION ....................................................................... 7 2.1 MODULE DESCRIPTION ......................................................................................................................... 7 2.1.1 Module Validation Level .............................................................................................. 7 2.1.2 Module components ................................................................................................... 7 2.1.3 Tested Platforms ......................................................................................................... 8 2.2 MODES OF OPERATION ......................................................................................................................... 8 2.2.1 Approved Security Functions: ..................................................................................... 9 2.2.2 Non-Approved Security Functions: ........................................................................... 11 2.3 CRYPTOGRAPHIC MODULE BOUNDARY ................................................................................................. 12 2.4 MODULE USAGE CONSIDERATIONS ...................................................................................................... 13 3 CRYPTOGRAPHIC MODULE PORTS AND INTERFACES ....................................................... 14 4 ROLES, SERVICES AND AUTHENTICATION ......................................................................... 15 4.1 ROLES .............................................................................................................................................. 15 4.2 SERVICES .......................................................................................................................................... 15 4.3 OPERATOR AUTHENTICATION .............................................................................................................. 17 5 PHYSICAL SECURITY ....................................................................................................... 18 6 OPERATIONAL ENVIRONMENT .......................................................................................... 19 6.1 APPLICABILITY ................................................................................................................................... 19 6.2 POLICY ............................................................................................................................................. 19 7 CRYPTOGRAPHIC KEY MANAGEMENT .............................................................................. 20 7.1 RANDOM NUMBER GENERATION .......................................................................................................... 20 7.2 KEY / CSP GENERATION ..................................................................................................................... 21 7.3 KEY / CSP ESTABLISHMENT ................................................................................................................ 21 7.4 KEY / CSP ENTRY AND OUTPUT .......................................................................................................... 21 7.5 KEY / CSP STORAGE .......................................................................................................................... 22 7.6 KEY / CSP ZEROIZATION .................................................................................................................... 22 8 ELECTROMAGNETIC INTERFERENCE/ELECTROMAGNETIC COMPATIBILITY (EMI/EMC) ...... 23 9 SELF-TESTS ..................................................................................................................... 24 9.1 POWER-UP TESTS ............................................................................................................................. 24 9.1.1 Cryptographic Algorithm Tests ................................................................................. 24 9.1.2 Software / Firmware Integrity Tests .......................................................................... 24 9.1.3 Critical Function Tests .............................................................................................. 24 9.2 CONDITIONAL TESTS .......................................................................................................................... 25 9.2.1 Continuous Random Number Generator Test .......................................................... 25 9.2.2 Pair-wise Consistency Test ...................................................................................... 25 9.2.3 SP 800-90A Health Tests ........................................................................................ 25 9.2.4 Critical Function Test ................................................................................................ 25 10 DESIGN ASSURANCE ..................................................................................................... 26 10.1 CONFIGURATION MANAGEMENT .......................................................................................................... 26 10.2 DELIVERY AND OPERATION .................................................................................................................. 26 10.3 DEVELOPMENT .................................................................................................................................. 26 Document Version: 1.3 Last update: 2021-03-18 ©2021 Apple Inc. Page 2 of 27 10.4 GUIDANCE ........................................................................................................................................ 26 10.4.1 Cryptographic Officer Guidance ............................................................................... 26 10.4.2 User Guidance .......................................................................................................... 26 11 MITIGATION OF OTHER ATTACKS .................................................................................. 27 List of Tables Table 1: Module Validation Level .................................................................................................................... 7 Table 2: Tested Platforms .............................................................................................................................. 8 Table 3: Approved, Allowed and Vendor Affirmed Security Functions ........................................................ 10 Table 3a: Non-Approved but Allowed Security Functions ........................................................................... 10 Table 4: Non-Approved or Non-Compliant Security Functions ................................................................... 12 Table 5: Roles ............................................................................................................................................... 15 Table 6: Approved and Allowed Services in Approved Mode ...................................................................... 16 Table 7: Non-Approved Services in Non-Approved Mode ........................................................................... 17 Table 8: Module Cryptographic key and CSPs ............................................................................................. 20 Table 9: Cryptographic Algorithm Tests ...................................................................................................... 24 List of Figures Figure 1: Logical Block Diagram ..................................................................................................... 13 Document Version: 1.3 Last update:2021-03-18 ©2021 Apple Inc. Page 3 of 27 1 Introduction 1.1 Purpose This document is a non-proprietary Security Policy for the Apple corecrypto User Space Module for Intel (ccv10). It describes the module and the FIPS 140-2 cryptographic services it provides. This document also defines the FIPS 140-2 security rules for operating the module. This document was prepared in fulfillment of the FIPS 140-2 requirements for cryptographic modules and is intended for security officers, developers, system administrators, and end-users. FIPS 140-2 details the requirements of the Governments of the U.S. and Canada for cryptographic modules, aimed at the objective of protecting sensitive

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    27 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us