This page was not yet optimized for use on mobile
devices.
Apple CoreCrypto Module v9.0 for ARM
Certificate #3433
Webpage information
Security policy
Symmetric Algorithms
AES, AES-128, AES-256, CAST5, RC4, RC2, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-384, SHA-512, SHA-224, SHA-256, SHA-2, MD4, MD5, RIPEMD, PBKDFSchemes
MAC, Key Agreement, Key agreementProtocols
TLSRandomness
DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521, Curve P-192, curve P-192, P-192, Ed25519Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
level 1, Level 2Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS 198, FIPS186-4, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, SP 800-56A, SP 800-38D, NIST SP 800-90A, SP 800-133, PKCS#1, RFC6637, RFC 5288File metadata
| Title | FIPS 140-2 Non-Proprietary Security Policy |
|---|---|
| Keywords | FIPS 140-2, FSM |
| Author | Renaudt Nunez |
| Creation date | D:20190405101234-05'00' |
| Modification date | D:20190405101234-05'00' |
| Pages | 32 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3433,
"dgst": "2adcda788844f02e",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"CVL#C95",
"DRBG#2430",
"Triple-DES#C242",
"AES#5717",
"AES#5712",
"RSA#C101",
"DSA#C242",
"AES#5727",
"AES#C25",
"ECDSA#C239",
"HMAC#C96",
"SHS#4636",
"AES#5838",
"DRBG#2433",
"SHS#C242",
"SHS#C96",
"SHS#C148",
"SHS#4575",
"AES#C148",
"ECDSA#C245",
"AES#5836",
"AES#C16",
"CVL#C239",
"AES#5879",
"DRBG#C107",
"AES#C99",
"AES#C145",
"DSA#C239",
"DRBG#C95",
"RSA#3084",
"SHS#C95",
"AES#5881",
"CVL#C242",
"CVL#C100",
"RSA#C243",
"AES#C10",
"AES#5707",
"CVL#C101",
"HMAC#C242",
"DSA#1481",
"DRBG#2322",
"AES#5713",
"HMAC#3804",
"AES#C243",
"HMAC#3800",
"HMAC#C243",
"DSA#C99",
"RSA#C98",
"AES#5709",
"SHS#C102",
"SHS#C100",
"AES#5725",
"AES#5702",
"SHS#4572",
"DRBG#C247",
"SHS#C99",
"DRBG#2326",
"Triple-DES#C107",
"AES#C11",
"RSA#C245",
"SHS#C239",
"AES#C146",
"HMAC#C148",
"Triple-DES#C245",
"DRBG#2314",
"AES#C27",
"RSA#C148",
"DRBG#C243",
"CVL#C97",
"AES#C30",
"DRBG#C245",
"SHS#C245",
"AES#5880",
"DRBG#C239",
"DRBG#2333",
"Triple-DES#C96",
"HMAC#3857",
"Triple-DES#C101",
"DRBG#C242",
"ECDSA#C96",
"ECDSA#C148",
"RSA#C95",
"AES#5701",
"SHS#4631",
"AES#5737",
"AES#C95",
"AES#C247",
"CVL#C102",
"SHS#4577",
"AES#C105",
"DRBG#C106",
"AES#5740",
"AES#5736",
"HMAC#3798",
"ECDSA#C99",
"CVL#2180",
"AES#5708",
"CVL#C243",
"HMAC#C239",
"CVL#C99",
"AES#5739",
"AES#5886",
"SHS#4573",
"CVL#C107",
"DRBG#C240",
"AES#5711",
"DRBG#2324",
"DRBG#2335",
"DRBG#2316",
"DRBG#C145",
"ECDSA#1567",
"DRBG#C246",
"DRBG#C99",
"DRBG#2445",
"SHS#C101",
"DRBG#2331",
"AES#C98",
"HMAC#C101",
"DSA#C97",
"Triple-DES#C243",
"AES#5724",
"ECDSA#C243",
"AES#5845",
"AES#5719",
"AES#C107",
"HMAC#C107",
"RSA#C239",
"Triple-DES#C239",
"AES#5732",
"DSA#C148",
"AES#5840",
"DRBG#C148",
"DRBG#2332",
"ECDSA#C242",
"Triple-DES#C98",
"AES#C13",
"DRBG#2443",
"ECDSA#C102",
"Triple-DES#C102",
"CVL#2115",
"CVL#C148",
"AES#5844",
"DRBG#C29",
"SHS#C13",
"AES#C97",
"AES#C241",
"AES#5733",
"DRBG#2449",
"SHS#C243",
"DRBG#2315",
"SHS#C98",
"AES#5718",
"DRBG#2327",
"AES#C96",
"HMAC#3861",
"AES#5710",
"SHS#4576",
"DSA#C102",
"AES#C100",
"AES#5728",
"Triple-DES#2866",
"RSA#C102",
"AES#5714",
"AES#5716",
"AES#5734",
"DRBG#2434",
"AES#C12",
"AES#5722",
"AES#5843",
"DRBG#2328",
"AES#C242",
"DSA#C243",
"DRBG#2321",
"DRBG#2317",
"AES#C28",
"DRBG#C100",
"ECDSA#C95",
"DSA#C98",
"SHS#4632",
"DRBG#C16",
"DRBG#2429",
"SHS#4571",
"DRBG#2432",
"DSA#C101",
"SHS#4578",
"DRBG#2330",
"ECDSA#C97",
"HMAC#C13",
"AES#5730",
"HMAC#C30",
"AES#C106",
"HMAC#C100",
"RSA#C97",
"AES#5715",
"DRBG#C241",
"DRBG#C102",
"HMAC#C97",
"AES#C29",
"ECDSA#C98",
"HMAC#3801",
"HMAC#3803",
"AES#5842",
"Triple-DES#C99",
"DRBG#2312",
"DRBG#C30",
"DRBG#2334",
"DRBG#2325",
"CVL#C96",
"AES#5731",
"DRBG#C97",
"AES#C246",
"HMAC#C102",
"DRBG#2431",
"RSA#C99",
"AES#C101",
"Triple-DES#C97",
"DRBG#2319",
"AES#5720",
"DRBG#2320",
"DRBG#2318",
"DRBG#C13",
"DRBG#2329",
"Triple-DES#C95",
"RSA#C107",
"AES#5723",
"Triple-DES#C100",
"ECDSA#C101",
"AES#5721",
"AES#5839",
"DSA#C100",
"HMAC#C16",
"AES#5726",
"AES#C15",
"AES#C14",
"HMAC#C99",
"AES#5882",
"AES#C102",
"AES#5738",
"DRBG#C101",
"AES#C240",
"DSA#C96",
"Triple-DES#C148",
"AES#5704",
"HMAC#3805",
"SHS#C16",
"AES#5705",
"AES#C245",
"DRBG#2444",
"RSA#C96",
"HMAC#C245",
"HMAC#C98",
"DRBG#C98",
"RSA#C242",
"AES#C239",
"AES#5703",
"SHS#4574",
"SHS#C97",
"HMAC#C95",
"DSA#C95",
"AES#5706",
"CVL#C245",
"HMAC#3802",
"RSA#C100",
"SHS#C30",
"DRBG#2323",
"HMAC#3863",
"HMAC#C29",
"AES#5841",
"DRBG#C96",
"AES#5837",
"SHS#C107",
"AES#C26",
"AES#5735",
"SHS#C29",
"DRBG#C146",
"DRBG#2313",
"DSA#C107",
"HMAC#3799",
"SHS#4638",
"ECDSA#C107",
"CVL#C98",
"HMAC#3856",
"AES#5729",
"DRBG#C105",
"DSA#C245",
"ECDSA#C100"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"9.0"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDSA": {
"ECDSA": 17
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 15
},
"DSA": {
"DSA": 3
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CCM": {
"CCM": 5
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 10
},
"ECB": {
"ECB": 10
},
"GCM": {
"GCM": 8
},
"OFB": {
"OFB": 5
},
"XTS": {
"XTS": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 3
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 5,
"Key agreement": 3
},
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 4
},
"NIST": {
"Curve P-192": 3,
"P-192": 7,
"P-224": 8,
"P-256": 12,
"P-384": 12,
"P-521": 8,
"curve P-192": 4
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES-128": 5,
"AES-256": 4,
"DSA 5": 1,
"HMAC- SHA-384": 1,
"HMAC- SHA-512": 1,
"HMAC-SHA-1": 10,
"HMAC-SHA-224": 10,
"HMAC-SHA-256": 10,
"HMAC-SHA-256 3798": 2,
"HMAC-SHA-256 3863": 2,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 6,
"HMAC-SHA1": 2,
"PAA1": 1,
"PKCS#1": 20,
"RSA PKCS#1": 4,
"SHA-1": 3,
"SHA-2": 1,
"SHA-224": 3,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 2,
"SHA1": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 1,
"level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 3
}
},
"PBKDF": {
"PBKDF": 4
},
"RIPEMD": {
"RIPEMD": 2
},
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 1
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 4,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 12
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 23,
"FIPS 180-4": 2,
"FIPS 186-4": 4,
"FIPS 197": 2,
"FIPS 198": 2,
"FIPS PUB 140-2": 1,
"FIPS186-4": 2
},
"NIST": {
"NIST SP 800-90A": 1,
"SP 800-132": 2,
"SP 800-133": 1,
"SP 800-38": 4,
"SP 800-38D": 1,
"SP 800-56A": 2,
"SP 800-67": 1,
"SP 800-90": 1,
"SP 800-90A": 5
},
"PKCS": {
"PKCS#1": 12
},
"RFC": {
"RFC 5288": 1,
"RFC6637": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 12,
"AES-128": 5,
"AES-256": 4
},
"CAST": {
"CAST5": 3
},
"RC": {
"RC2": 3,
"RC4": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 12
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"HMAC": 10,
"HMAC-SHA-224": 3,
"HMAC-SHA-256": 5,
"HMAC-SHA-384": 4,
"HMAC-SHA-512": 5
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 3
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Renaudt Nunez",
"/CreationDate": "D:20190405101234-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "FIPS 140-2, FSM",
"/ModDate": "D:20190405101234-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 863305,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program",
"https://support.apple.com/en-us/HT202739",
"http://developer.apple.com/library/ios/#documentation/Miscellaneous/Conceptual/iPhoneOSTechOverview/Introduction/Introduction.html",
"http://developer.apple.com/library/ios/#documentation/Security/Conceptual/Security_Overview/Introduction/Introduction.html",
"https://csrc.nist.gov/projects/cryptographic-module-validation-program",
"https://csrc.nist.gov/projects/cryptographic-module-validation-%20program/standards",
"https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-%20Validation-Program/documents/fips140-2/FIPS1402IG.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "15accfb25170ec6919f920194b9fe734fd142b3429673067417e5f4bc75c1123",
"policy_txt_hash": "d844c17f31061cc9c4c6938e70fdee2c2bb54778efa30578f17be57b44c87688"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS Mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/AprilConsolidated.pdf",
"date_sunset": null,
"description": "The Apple CoreCrypto Module v9.0 for ARM is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A"
],
"fw_versions": null,
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Apple CoreCrypto Module v9.0 for ARM",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "9.0",
"tested_conf": [
"iOS 12 running on iPad Air 2 with Apple A8X CPU with PAA",
"iOS 12 running on iPad Air 2 with Apple A8X CPU without PAA",
"iOS 12 running on iPad Pro with Apple A10X Fusion CPU with PAA",
"iOS 12 running on iPad Pro with Apple A10X Fusion CPU without PAA",
"iOS 12 running on iPad Pro with Apple A12X Bionic CPU with PAA",
"iOS 12 running on iPad Pro with Apple A12X Bionic CPU without PAA",
"iOS 12 running on iPad Pro with Apple A9X CPU with PAA",
"iOS 12 running on iPad Pro with Apple A9X CPU without PAA",
"iOS 12 running on iPhone 5S with Apple A7 CPU with PAA",
"iOS 12 running on iPhone 5S with Apple A7 CPU without PAA",
"iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU with PAA",
"iOS 12 running on iPhone 6 (iPhone 6 and iPhone 6 Plus) with Apple A8 CPU without PAA",
"iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU with PAA",
"iOS 12 running on iPhone 6S (iPhone 6S and iPhone 6S Plus) with Apple A9 CPU without PAA",
"iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU with PAA",
"iOS 12 running on iPhone 7 (iPhone 7 and iPhone 7 Plus) with Apple A10 Fusion CPU without PAA",
"iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU with PAA",
"iOS 12 running on iPhone 8 (iPhone 8, iPhone 8 Plus and iPhone X) with Apple A11 Bionic CPU without PAA",
"iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU with PAA",
"iOS 12 running on iPhone XS (iPhone XR, iPhone XS and iPhone XS Max) with Apple A12 Bionic CPU without PAA",
"tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU with PAA",
"tvOS 12 running on Apple TV 4K with Apple A10X Fusion CPU without PAA",
"TxFW 16P374 running on Apple iMac Pro with Apple T2 with PAA",
"TxFW 16P374 running on Apple iMac Pro with Apple T2 without PAA",
"TxFW 16P374 running on Apple MacBook Pro with Apple T2 with PAA",
"TxFW 16P374 running on Apple MacBook Pro with Apple T2 without PAA (single-user mode)",
"watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU with PAA",
"watchOS 5 running on Apple Watch Series 1 with Apple S1P CPU without PAA",
"watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU with PAA",
"watchOS 5 running on Apple Watch Series 3 with Apple S3 CPU without PAA",
"watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU with PAA",
"watchOS 5 running on Apple Watch Series 4 with Apple S4 CPU without PAA"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-04-11",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-03-11",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Apple Inc.",
"vendor_url": "http://www.apple.com"
}
}