1 Macronix Proprietary V1.02, April 19, 2022 Macronix ArmorFlash MX78 series Cryptographic Module FIPS 140-2 Security Policy Version : V1.02 Date : April 15, 2022 2 Macronix Proprietary V1.02, April 19, 2022 Revision History Version Description Date 1.00 Update page 7, 14 2021/12/20 1.01 Update page 4,9 2022/03/31 1.02 Update page 7 2022/4/19 3 Macronix Proprietary V1.02, April 19, 2022 Table of Contents 1 Introduction ................................................................................................................................5 1.1 Purpose................................................................................................................................5 1.2 Scope....................................................................................................................................5 1.3 Security Level.....................................................................................................................5 2 Cryptographic Module Specification..........................................................................6 2.1 Cryptographic Module Boundary .................................................................................6 2.2 Hardware..............................................................................................................................7 2.3 FIPS Approved Mode of Operation...............................................................................8 2.4 FIPS Approved Security Functions..............................................................................9 3 Cryptographic Module Ports and Interfaces..............................................................9 3.1 Physical Ports ..................................................................................................................10 3.2 Logical Interfaces............................................................................................................11 4 Roles, Services and Authentication...................................................................................12 4.1 Roles...................................................................................................................................12 4.2 Identification and Authentication................................................................................12 4.3 Services .............................................................................................................................13 5 Physical Security .......................................................................................................14 5.1 Physical Security mechanisms as required by FIPS 140-2 .................................15 6 Operational Environment ..........................................................................................15 7 Cryptographic Key Management ..............................................................................15 7.1 Critical Security Parameters and Public Keys ........................................................15 7.2 Key Generation and Diversification ...........................................................................16 7.3 Key Entry and Output.....................................................................................................16 7.4 Key Storage ......................................................................................................................16 7.5 Key Zeroization................................................................................................................16 7.6 RNG Seed Values ............................................................................................................16 7.7 Key/IV Pair Uniqueness Requirements from SP 800-38D ....................................16 8 Electromagnetic Interference/Compatibility (EMI/EMC) .........................................17 9 Self-Tests....................................................................................................................17 9.1 Power-up Self-Tests .......................................................................................................17 9.2 Conditional Self-Tests....................................................................................................18 10 Design Assurance......................................................................................................19 4 Macronix Proprietary V1.02, April 19, 2022 10.1 Configuration Management.........................................................................................19 10.2 Delivery and Operation.................................................................................................19 10.3 Guidance Documents...................................................................................................19 11 Mitigation of Other Attacks...................................................................................................19 12 Security Rules..........................................................................................................................20 12.1 General Security Rules.................................................................................................20 12.2 Identification and Authentication Security Rules..................................................20 12.3 Access Control Security Rules .................................................................................21 12.4 Physical Security Rules...............................................................................................22 12.5 Mitigation of Other Attacks Security Rules.............................................................22 13 References..................................................................................................................22 14 Acronyms ...................................................................................................................23 5 Macronix Proprietary V1.02, April 19, 2022 1 Introduction 1.1 Purpose This is a non-proprietary security policy for the Macronix ArmorFlash MX78 series cryptographic module, hereafter denoted ArmorFlash. This Security Policy describes how the cryptographic module meets the requirements for a FIPS 140-2 level 2 validation as specified in the FIPS 140-2 standard. This Security Policy is part of the evidence documentation package to be submitted to the validation lab. FIPS 140-2 specifies the security requirements for a cryptographic module protecting sensitive information. Based on four security levels for cryptographic modules this standard identifies requirements in eleven sections. For more information about the standard, please visit http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf 1.2 Scope This Security Policy specifies the security rules under which the cryptographic module operates its major properties. It does not describe the requirements for the entire system, which makes use of the cryptographic module. 1.3 Security Level The module meets the overall requirements applicable to FIPS140-2 Security Level 2. In the individual requirement sections of FIPS 140-2 the following Security Level ratings are achieved: Section Section Title Level 1 Cryptographic Module Specification 2 2 Cryptographic Module Ports and Interfaces 2 3 Roles, Services, and Authentication 3 4 Finite State Model 2 5 Physical Security 2 6 Operational Environment N/A 6 Macronix Proprietary V1.02, April 19, 2022 Section Section Title Level 7 Cryptographic Key Management 2 8 EMI/EMC 2 9 Self-tests 2 10 Design Assurance 2 11 Mitigation of Other Attacks 2 Table 1 – Security Level per FIPS 140-2 Section 2 Cryptographic Module Specification The ArmorFlash is intended for use in general purpose computing environments, as a device peripheral to the CPU, with the application controlling the usage of the module. The ArmorFlash is a single chip cryptographic hardware module as defined in FIPS 140-2. The single silicon chip is encapsulated in a hard, opaque, production grade integrated circuit (IC) package. The security module supports SPI interfaces. 2.1 Cryptographic Module Boundary The cryptographic boundary is defined as the perimeter of the IC package. The perimeter of the module forms the cryptographic boundary of this FIPS140-2 Security Level 2 compliant single-chip cryptographic module. The module block diagram and logical boundary are shown as following. 7 Macronix Proprietary V1.02, April 19, 2022 Figure 1 – Cryptographic Module Block Diagram 2.2 Hardware The Module is a single-chip module that contains a Memory, X/Y-Decoder, Sense Amplifier, HV Generator, Address Generator, Data Register, SRAM, Mode Logic, Clock generator, State Machine and Crypto Engine. The boundary of the single-chip module is the edges and surfaces of the integrated circuit die. No components are excluded from the cryptographic boundary. The module is available in configurations shown in table 2. Hardware Version Voltage Density MX78U64A00F/ MX78U64B00G MX78U128A00F/ MX78U128B00G MX78U256A00F/ MX78U256B00G 1.8V 64Mb 128Mb 256Mb MX78L64A00F/ MX78L64B00G MX78L128A00F/ MX78L128B00G MX78L256A00F/MX78L256B00G 3.0V 64Mb 128Mb 256Mb Table 2 – Cryptographic Module Configurations The following figures show the physical form of the module. 8 Macronix Proprietary V1.02, April 19, 2022 Figure 2 – Top View Figure 3 – Bottom View This module comprises the following components.  Memory  X/Y-Decoder  Sense Amplifier  HV Generator  Address Generator  Data Register  SRAM  Mode Logic  Clock Generator  State Machine  Crypto Engine that includes Random number generator, AES, HMAC, ECC CDH 2.3 FIPS Approved Mode of Operation The module shall not contain a non-FIPS Approved mode of operation. Hence, as configured during production process, the module only operates in a FIPS Approved mode of operation. When the module is powered up and successfully completes the power up self-test, the module enters the FIPS approved mode of operation. The module does not implement bypass or maintenance modes. 9 Macronix Proprietary V1.02, April 19, 2022 2.4 FIPS Approved Security Functions The following table gives the list of FIPS Approved security functions that are provided by the module. Security Function Details CAVP Cert. # AES ECB (e/d; 128, 256 ) ; CTR (e; 256) C1928 AES GCM GCM (e/d; 128) C1928 AES CCM CCM (e/d; 256) C1928 SHS SHA-256 (BYTE-only) C1928 DRBG CTR_DRBG (AES-256Key) C1928 HMAC HMAC-SHA256 (Key Size Ranges Tested: KS