Standalone IMB Non‐Proprietary Security Policy GDC Technology (USA), LLC Version 1.4 July 14, 2016 Page 2 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW............................................................................................................ 3 2. SECURITY LEVEL................................................................................................................... 4 3. MODES OF OPERATION........................................................................................................ 4 4. PORTS AND INTERFACES...................................................................................................... 5 5. IDENTIFICATION AND AUTHENTICATION POLICY................................................................. 6 6. ACCESS CONTROL POLICY .................................................................................................... 7 ROLES AND SERVICES......................................................................................................................................................7 UNAUTHENTICATED SERVICES:..........................................................................................................................................8 DEFINITION OF CRITICAL SECURITY PARAMETERS (CSPS).......................................................................................................8 DEFINITION OF CSPS MODES OF ACCESS............................................................................................................................9 7. OPERATIONAL ENVIRONMENT .......................................................................................... 11 8. SECURITY RULES ............................................................................................................... 12 9. PHYSICAL SECURITY POLICY ............................................................................................... 13 PHYSICAL SECURITY MECHANISMS ..................................................................................................................................13 OPERATOR REQUIRED ACTIONS ......................................................................................................................................13 10. MITIGATION OF OTHER ATTACKS POLICY......................................................................... 14 11. DEFINITIONS AND ACRONYMS......................................................................................... 14 Page 3 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. 1. Module Overview The Standalone IMB cryptographic module (Firmware Version 2.5 with Security Manager Firmware Version 1.5.0; Hardware Version: GDC‐ IMB‐v3, R12), hereafter referred to as the cryptographic module or module, is a Security Processor Block, Type 1, designed in accordance with FIPS 140‐2 and the Digital Cinema Initiatives (DCI) Digital Cinema System Specification. For FIPS 140‐2 purposes, the IMB is defined as a multi‐chip embedded cryptographic module encased in a hard, opaque removable enclosure with tamper detection and response circuitry. The images below depict the cryptographic module; all components not contained within the metal enclosure (security region) are explicitly excluded from the requirements of FIPS 140‐2 as they are non‐security relevant and have no impact on the overall security of the module. Excluded items fall into the following non‐security relevant categories:  Power Supply  Unconnected Components and Test Points  Mechanical Connections  Video and Audio Components Figure 1 ‐ Image of the GDC‐IMB‐v3 (Top) Figure 2 ‐ Image of the GDC‐IMB‐v3 (Bottom) Page 4 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. 2. Security Level The cryptographic module meets the overall requirements applicable to FIPS 140‐2 Level 2. Table 1 ‐ Module Security Level Specification Security Requirements Section Level Cryptographic Module Specification 3 Module Ports and Interfaces 2 Roles, Services and Authentication 3 Finite State Model 2 Physical Security 3 Operational Environment N/A Cryptographic Key Management 2 EMI/EMC 2 Self‐Tests 2 Design Assurance 3 Mitigation of Other Attacks N/A 3. Modes of Operation Approved mode of operation The module supports the following Approved and allowed algorithms in the Approved mode of operation:  AES‐128 CBC, Decrypt only (Cert. #2148)  AES 128, 192, 256 ECB, CBC, CFB8, CFB128, OFB modes (Cert. #3938)  SHA‐1 (Cert. #1869)  SHA‐1, ‐224, ‐256, ‐384, ‐512 (Cert. #3247)  SP800‐90A CTR_DRBG (Cert. #1145)  RSA FIPS 186‐2 Signature Verification, FIPS 186‐4 Signature Generation/Verification (Cert. #2012)  HMAC‐SHA‐1 (Cert. #1315)  HMAC‐SHA‐1, ‐224, ‐256, ‐384, ‐512 (Cert. #2560)  TLS KDF (CVL Cert. #785); TLS has not been reviewed or tested by the CAVP and CMVP Page 5 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. The module supports the following non‐Approved algorithms allowed for use in the Approved mode of operation.  RSA (key wrapping, key establishment methodology provides 112‐bits of encryption strength)  HW NDRNG, allowed for seeding the DRBG  MD5, allowed for use exclusively within TLS Non‐Approved mode of operation The module only supports EC‐Diffie‐Hellman in the non‐Approved mode of operation to support legacy equipment. The module is always in an Approved mode of operation, except when status is explicitly retrieved from an external digital cinema projector. 4. Ports and Interfaces The cryptographic module provides the following physical ports and logical interfaces:  RS‐232 (Qty. 2): Status Output  PCIe to SOM: Data Input, Data Output, Control Input, Status Output  Projector tamper switch input (Qty. 2): Control Input  Ethernet (Qty. 3): Data Input, Data Output, Control Input, Status Output  GPIO (Qty. 4): Data Output, Control Input, Status Output  AES‐Audio output (Qty. 3): Data Output  LVDS video output: Data Output  LTC (Linear Time Code) I/O (Qty. 2): Data Input, Data Output  Video ref in/out (Qty. 2): Data Input, Data Output  SDI In (Qty. 2): Data Input  Reset: Control Input  HDMI in: Data Input  LED (Qty. 4): Status Output  Battery (Qty. 2): Power Input  USB (Qty. 3): Data Input, Data Output, Control Input  eSata (Qty. 2): Data Input, Data Output Page 6 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision].  SOM Power: Power Input  VGA Connector: Status Output  CFAST Connector: Data Input, Data Output 5. Identification and Authentication Policy Assumption of roles The cryptographic module supports two distinct operator roles, which are the User and Cryptographic‐Officer roles. Table 2 ‐ Roles and Required Identification and Authentication Role Type of Authentication Authentication Data Cryptographic‐Officer Identity‐based operator authentication 2048‐bit Digital Signature User Identity‐based operator authentication 2048‐bit Digital Signature Table 3 – Strengths of Authentication Mechanisms Authentication Mechanism Strength of Mechanism Digital Signature The strength of a 2048‐bit RSA key is known to be 112‐bits. Therefore, the strength of a 2048‐ bit digital signature is 1/2^112, which is less than 1/1,000,000. In a worst case scenario, the module can perform 4725 signature verifications per minute, which does not include network limitations or timing constraints. Therefore, the probability that multiple attacks within a given minute will be successful is 4725/2^112. Page 7 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. 6. Access Control Policy Roles and Services Table 4 – Services Authorized for Roles Role Authorized Services Cryptographic‐Officer  Load Firmware: Install a firmware upgrade.  Import MB Private Key: Update the MB Private Key. User  Get Time: Retrieve current time. * Update Time: Adjust current time. * Import KDM: Ingest a new Key Delivery Message for content playback. * Purge KDM: Remove the identified KDM. * Check KDM: Verify the validity of a KDM for playback. * Setup CPL: Prepare to playback a Composition Playlist. * Purge All KDM: Remove all KDMs. * Query KDM All: List the KDMs currently installed. * Get Logs: Provide log reports from the Security Manager. * Get Log Info: Provide logging device information, such as event class, type, and sub‐type. * Get Log Sig: Retrieve the log report signature. * Install Status: Query the installation status. * Play Control: Setup the Security Manager to playback a reel. * SM Status: Provide the Security Manager status. * SM Projector Tamper Control: Manage the tamper control Page 8 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. Role Authorized Services mechanism of the projector. * SM Heartbeat: Verify the Security Manager is still active. * Get Build Info: Retrieve Security Manager version information. * SM Sys Log: Set syslog IP address. * SM Playerd Log: Request Security Manager to log playback. * LoadAssetMap: Load asset locations required for playback. * IMB GPIO Output: Trigger hardware GPIO output. * ReloadConfig: Reload player configuration. Unauthenticated Services: The cryptographic module supports the following unauthenticated services: * Show Status: Provides the current status of the module through LEDs. * Network Configuration: Non‐security relevant configuration of the module. * Self‐tests: Invoke the power‐on self‐tests by power cycling the module. Definition of Critical Security Parameters (CSPs) The module contains the following CSPs:  Media Block Private Key (RSA 2048‐bit) – Used to decrypt KDMs and sign security logs  IMB TLS Private Key (RSA 2048‐bit) – Used to facilitate an internal TLS session  Protection AES Key (AES 128‐bit) – Used to encrypt the Media Block Private Key and Content Encryption Keys for persistent storage  Content Encryption Key (AES 128‐bit) – Used to decrypt content data  Content Integrity Key (HMAC‐SHA‐1 128‐bit) – Used to verify integrity of content data  TLS Encryption Keys (AES 128‐bit) – Provides data protection over TLS session  TLS Integrity Keys (HMAC‐SHA‐1 160‐bit) – Provides data integrity over TLS session Page 9 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision].  DRBG Key – Part of the state of the DRBG  DRBG V – Part of the state of the DRBG Definition of Public Keys: The following are the public keys contained in the module:  Media Block Public Key (RSA 2048‐bit) – Used by external entities as the counterpart to the Media Block Public Key entities  IMB TLS Public Key (RSA 2048‐bit) – Used to facilitate an internal TLS session  SM TLS Public Key (RSA 2048‐bit) – Used to establish TLS connections  SMS Root CA Certificate (RSA 2048‐bit) – Used to verify the validity of SMS public keys received during a TLS session  GDC FW Public Key (RSA 2048‐bit) – Used to verify firmware updates  Content Provider Public Keys (RSA 2048‐bit) – Used to verify digital signatures on KDMs and CPLs  Projector Public Keys (RSA 2048‐bit) – Used during the DCI marriage process  SMS Public Keys (RSA 2048‐bit) – Used to verify authorized SMS during TLS sessions Definition of CSPs Modes of Access Table 5 defines the relationship between access to CSPs and the different module services. The modes of access shown in the table are defined as follows:  Read  Write Please note that all authenticated services are sent through an encrypted TLS tunnel and as such, TLS related CSPs are utilized during each service. Table 5 – CSP Access Rights within Roles & Services Role Service Cryptographic Keys and CSPs Access Operation C.O. User X Load N/A Page 10 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. Firmware/File X Import MB Private Key Read, Write MB Private Key Read, Write Protection AES Key X Get Time N/A X Update Time N/A X Import KDM Read MB Private Key Write Content Encryption Key X Purge KDM Write Content Encryption Key X Check KDM N/A X Setup CPL N/A X Purge All KDM Write Content Encryption Key X Query KDM All N/A X Get Logs N/A X Get SM Log Info N/A X Get SM Log Signature Read MB Private Key X Install Status N/A X Play Control Read Content Encryption Key, Write Content Integrity Key, Read Protection AES Key X SM Status N/A X SM Projector Tamper Control N/A X SM Heartbeat N/A X Get Build Info N/A X SM Sys Log N/A X SM Playerd N/A Page 11 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. Log X Load Asset Map N/A X Playback Control Read Content Encryption Key, Write Content Integrity Key, Read Protection AES Key X IMB GPIO Output N/A X Reload Config N/A X X Self‐Tests N/A X X Show Status N/A 7. Operational Environment The FIPS 140‐2 Area 6 Operational Environment requirements are not applicable; the cryptographic module supports a limited operational environment that restricts the loading of firmware by ensuring all firmware being installed is appropriately signed. Page 12 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. 8. Security Rules The cryptographic module’s design corresponds to the cryptographic module’s security rules. This section documents the security rules enforced by the cryptographic module: 1. The module provides identity‐based authentication. 2. The module will only provide access to cryptographic services if a valid role has been assumed. 3. The cryptographic module shall perform the following tests: A. Power up Self‐Tests: 1. Cryptographic algorithm tests: a. AES Encrypt/Decrypt Known Answer Tests (KAT) b. HMAC‐SHA‐1 KAT c. SHA‐1 KAT (tested as part of the HMAC‐SHA‐1 KAT) d. HMAC‐SHA‐1, ‐224, ‐256, ‐384, ‐512 KATs e. SHA‐1 KAT f. SHA‐224, ‐256, ‐384, ‐512 (tested as part of the HMAC SHA‐224, ‐256, ‐ 384, ‐512 KATs) g. RSA Sign/Verify KAT h. SP800‐90A DRBG KAT 2. Firmware Integrity Tests (32‐bit CRC) 3. Critical Functions Tests: N/A B. Conditional Self‐Tests: 1. Continuous RNG test – performed on NDRNG and DRBG 2. Firmware Load Test (RSA 2048‐bit Signature Verification) 3. SP800‐90 Health Tests 4. Data output shall be inhibited during self‐tests and error states. In an error state, the module will restart and re‐attempt self‐tests. 5. Status information shall not contain CSPs or sensitive data that if misused could lead to a compromise of the module. Page 13 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. 9. Physical Security Policy Physical Security Mechanisms The Standalone IMB is a multi‐chip embedded cryptographic module, which includes the following physical security mechanisms:  Production‐grade components.  Hard, opaque, removable enclosure with tamper detection and response.  Tamper evidence is provided by four (4) tamper seals that are applied during manufacturing. Figure 3 provides the correct locations of the tamper seals. Figure 3 ‐ Tamper Seal Placement Operator Required Actions The operator is required to periodically inspect the module for evidence of tampering. If the tamper seals have been broken, please contact your organization’s Security Administrator and the GDC Technology (USA), LLC. Page 14 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. Table 7 – Inspection/Testing of Physical Security Mechanisms Physical Security Mechanisms Recommended Frequency of Inspection/Test Inspection/Test Guidance Details Tamper evidence Monthly Physically inspect the tamper seals for visual signs that they have tampered with. Tamper Status Annually Ensure the module does not display any characteristics of an attempted breach. 10. Mitigation of Other Attacks Policy The module has not been designed to mitigate attacks beyond the scope of FIPS 140‐2 requirements. 11. Definitions and Acronyms AES Advanced Encryption Standard AES‐Audio Audio Engineering Society Audio ANSI American National Standards Institute CO Cryptographic Officer CPL Composition Playlist CSP Critical Security Parameter DCI Digital Cinema Initiative DRNG Deterministic Random Number Generator EMC Electromagnetic Compatibility EMI Electromagnetic Interference FIPS Federal Information Processing Standard Page 15 Copyright 2016, GDC Technology (USA), LLC. May be reproduced only in its original entirety [without revision]. FPGA Field Programmable Gate Array GP I/O General Purpose Input/Output HMAC Hash Message Authentication Code IMB Image Media Block IP Intellectual Property KAT Known Answer Test KDM Key Delivery Message LDB Link Decryptor Block LTC Linear Time Code LVDS Low‐Voltage Differential Signaling N/A Not Applicable NDRNG Non‐Deterministic Random Number Generator PCI‐E Peripheral Component Interconnect Express RNG Random Number Generator RSA Rivest, Shamir, Adleman SHA Secure Hash Algorithm SM Security Manager SMS Screen Management System SOM System‐On Module