iStorage Ltd. iStorage datAshur BT FIPS 140-2 Non-Proprietary Security Policy Document Version 1.0 iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 1 of 24 Table of Contents 1 Cryptographic Module Specification.......................................................................................4 1.1 Overview...........................................................................................................................4 1.2 FIPS Security Level..........................................................................................................6 1.3 Mode of Operation...........................................................................................................7 2 Module Ports and Interfaces...................................................................................................8 3 Rôles, Services, Authentication, and Identification...............................................................10 3.1 Rôles and Identification..................................................................................................10 3.2 Module Initialization........................................................................................................10 3.3 Services..........................................................................................................................11 3.4 Authentication................................................................................................................13 4 Physical Security...................................................................................................................15 5 Operational Environment.......................................................................................................15 6 Cryptographic Key Management..........................................................................................15 6.1 Cryptographic Algorithms..............................................................................................15 6.2 Critical Security Parameters...........................................................................................17 6.3 Zeroization of Critical Security Parameters...................................................................19 6.3.1 Zeroization via Factory Reset.................................................................................20 7 EMI/EMC Regulatory Compliance.........................................................................................20 8 Self-Tests...............................................................................................................................21 9 Mitigation of Other Attacks....................................................................................................23 10 Glossary of Terms and Acronyms.......................................................................................23 iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 2 of 24 List of Tables Table 1: Module Hardware and Firmware Versions......................................................................5 Table 2: FIPS Security Level.........................................................................................................6 Table 3: Module Ports and Interfaces...........................................................................................8 Table 4: LED Status Indications....................................................................................................9 Table 5: Module Rôles................................................................................................................10 Table 6: Services Available in FIPS Approved Mode.................................................................12 Table 7: FIPS Approved Algorithms............................................................................................16 Table 8: FIPS Allowed Algorithms..............................................................................................17 Table 9: FIPS Non-approved Algorithms....................................................................................17 Table 10: Critical Security Parameters.......................................................................................19 Table 11: Public Security Parameters.........................................................................................19 Table 12: Module Self-Tests.......................................................................................................22 List of Figures Figure 1: datAshur BT..................................................................................................................5 iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 3 of 24 1 Cryptographic Module Specification 1.1 Overview The iStorage datAshur BT is a multi-chip, stand-alone, cryptographic module that provides hardware-encrypted storage of user data with a USB 3.0 interface. Access to encrypted data is authenticated via the Bluetooth interface. User data is protected by 256-bit XTS-AES encryption that secures sensitive information from unauthorized disclosure in the event that the module is lost or stolen. The custom electronics within the module are encapsulated within an opaque, production grade epoxy. The module's enclosure defines the cryptographic boundary1 . The data encryption key (DEK) and other critical security parameters (CSPs) are generated by a NIST approved DRBG2 within the module when it is first used. The seed for the DRBG is also produced within the module from a hardware-based, entropy generator. 1 Excluded components within the cryptographic boundary include passive electronic components, LEDs, and a Bluetooth radio controller, BlueNRG-MSCSP HW V4.1 with firmware version 7.2c. 2 SP 800-90Ar1 – Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST. (June 2015). iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 4 of 24 Hardware Part Numbers Firmware Versions (implemented on all hardware versions) IS-FL-DBT-256-4 IS-FL-DBT-256-8 IS-FL-DBT-256-16 IS-FL-DBT-256-32 IS-FL-DBT-256-64 IS-FL-DBT-256-128 Each module has one each of Firmware A and Firmware B. Firmware A V1.01.10 Firmware B V2.4 Table 1: Module Hardware and Firmware Versions iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 5 of 24 Figure 1: iStorage datAshur BT 1.2 FIPS Security Level The module meets the overall requirements for FIPS 140-23 Level 3. FIPS Area FIPS Security Requirement Level 1 Cryptographic Module Specification 3 2 Module Ports and Interfaces 3 3 Rôles, Services, and Authentication 3 4 Finite State Model 3 5 Physical Security 3 6 Operational Environment n/a 7 Cryptographic Key Management 3 8 EMI/EMC 3 9 Self-Tests 3 10 Design Assurance 3 11 Mitigation of Other Attacks n/a Table 2: FIPS Security Level 3 FIPS 140-2 – Security Requirements for Cryptographic Modules. NIST. (December 2002). iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 6 of 24 1.3 Mode of Operation The module operates only in a FIPS approved mode. Approved mode is indicated by the three status-indicator LEDs illuminating one at a time, green, blue, and then red when the module is powered on. This indication means that firmware integrity checks and KATs have successfully passed. To meet the requirements for FIPS 140-2 Level 3, the module enforces the following security rules: • The cryptographic module provides two distinct operator rôles: User and Cryptographic Officer (CO). • The cryptographic module provides identity-based authentication. • When the module has not been placed in a valid rôle or is in an error state, the operator shall not have access to any cryptographic service. • The operator is capable of commanding the module to perform self-tests at any time by cycling the power. • Data output is inhibited during self-test, zeroization, key generation, and authentication. • No CSPs are output from the module in any form. • Each unique AES GCM/IV pair is used for one and only one secure communication session. • Each secure communication session is established between exactly two entities. • The module cannot establish a secure communication session with another, identical module. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 7 of 24 2 Module Ports and Interfaces The cryptographic module exposes the following physical ports and logical interfaces: Physical Port Logical Interface Description USB Data Data input Data output Control input Status output The USB Data port connects the module to the host computer. It is used to exchange decrypted user data as well as control and status information for the USB protocol. When the drive is locked the USB interface is disabled. Bluetooth Control input Status output Data input Data output User and CO Password received and module status information transmitted via the Bluetooth port. Red, green and blue LEDs Status output Refer to Table 4 for details. USB Power External power The USB VBUS (+5VDC) powers the module and embedded storage component. Table 3: Module Ports and Interfaces iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 8 of 24 LED Behavior4 Module State Status Description LEDs illuminate one at a time, green, blue, and then red. Red remains lit. Connected to USB power Module powered-on with all LEDs operational. Firmware integrity tests and KATs have passed. LEDs illuminate continuously in circling pattern, red then green then blue. Failed Module in error state. Red LED illuminated Locked Module locked. User data secure. Green LED illuminated Unlocked Module unlocked. DEK is unobfuscated. USB interface with host has not enumerated with the host computer. Green and blue LED illuminated Connected Module unlocked and connected to host computer. Green LED illuminated. Blue LED blinking Connected Module unlocked and connected to host computer. There is an active data transfer with host computer. Table 4: LED Status Indications To verify that the module is in good working order, power it on by connecting it to a USB power source. The three status indicator LEDs will blink one at a time and once each, green, blue, and then red, indicating that firmware integrity tests and KATs have passed successfully 4 Because the module is powered from USB, the LED indicators are valid only when when the module is connected to a USB port. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 9 of 24 3 Rôles, Services, Authentication, and Identification 3.1 Rôles and Identification The module implements level 3, identity-based authentication with two distinct rôles, one User identity and one Crypto-Officer identity. Identity Identification Authentication Data Description User5 User chooses ASCII value '1' for User identification. 7-15 character Password User has full access to all User services. CO CO chooses ASCII value '0' for CO identification. 7-15 character Password CO has full access to all CO services. Table 5: Module Rôles 3.2 Module Initialization A new module comes from the factory initialized with a default User Password of '11223344'. This factory default password must be changed before storing confidential data on the module6 . No CO Password is defined for a factory initialized module. In the factory initialized configuration, the module is ready for operation in a FIPS approved mode. If the module is zeroized, there will be neither a User Password nor a CO Password defined and there will be no DEK. The module must be initialized before it will operate in an approved mode. From this state, either a User or a CO Password may be defined first. A module operator must install a rôle appropriate, smartphone application to access the device user interface. Refer to the product user manual for details. 5 In the case where the User password is defined but no CO password is defined, the User identity behaves as a combined User/CO identity. 6 Per FIPS 140-2 §4.3.3, the default password does not meet the strength of the authentication requirement because it may be guessed in one attempt. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 10 of 24 3.3 Services Identity Service CSP Access CO Set CO Password Read, Execute, and Write Change CO Password, and CO KEK. Create DEK using CTR- DRBG state (seed, V, key) if one is not defined. Set User Password Read, Execute, and Write Change User Password and User KEK. Zeroize User Password Zeroize Zeroize User KEK. Erase private partition data Read, Execute, and Write Change CO KEK. Create DEK using CTR-DRBG state (seed, V, key). Zeroize Zeroize User KEK. Open private partition for read/write access to user data Read and Execute Read CO KEK. Unobfuscate DEK. Lock private partition to prevent read/write access to user data Zeroize Zeroize DEK in RAM. Read or write private partition with user data Read Use DEK to encrypt and decrypt user data. Configure idle timeout lock None Configure Remote Management None Change nickname None Configure Step-Away lock None User Set CO Password when none exists Read, Execute, and Write Change CO Password and CO KEK. Set User Password Read, Use, and Write Change User Password and User KEK. Create DEK using CTR-DRBG state (seed, V, key) if one is not defined. Open private partition for read/write access to user data Read and Execute Read and CO KEK. Unobfuscate DEK. Lock private partition to prevent read/write access to user data Zeroize Zeroize DEK in RAM. Read or write private partition with user data Read and Execute Use DEK to encrypt and decrypt user data. Configure idle timeout lock None Change nickname None Configure Step-Away lock None iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 11 of 24 Identity Service CSP Access Unauthenticated Show locked/unlocked status None Show whether or not drive is initialized None Show whether or not User Password is defined None Show whether or not CO Password is defined None Run self-tests None Factory reset (zeroize) module and erase private partition data Zeroize Zeroize all CSPs. Query firmware version None Authentication Read, Execute, and Write Create and read ECC-CDH Private Key, Session Master Secret, AES-GCM Key/IV Table 6: Services Available in FIPS Approved Mode iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 12 of 24 3.4 Authentication The Crypto Officer and User rôles authenticate via the Bluetooth interface. The module does not output CO or User authentication data outside of the cryptographic boundary. Communication via the Bluetooth interface is protected by encryption. Messages are encrypted and authenticated with AES-GCM (Cert. #5397). Cryptographic keys are established per SP 800-56Ar3 scheme C(0s, 2e, ECC CDH) and the single step KDF per SP 800-56Cr1 Section 4. These keys are used for key derivation using KBKDF (Cert. #201) in Counter Mode, which relies on AES-CMAC (Cert. #5366) and HMAC-SHA-1 (Cert. #3554) per SP 800-108, to create the AES-GCM keys. The Password, from either the User or the CO, is an input to PBKDFv2 (Cert. #A777) that produces the Key Encryption Key (KEK) for that rôle. The KEK is used by the non-approved cryptographic Synthetic Initialization Vector7 (SIV) algorithm to obfuscate the DEK. SIV is constructed using AES CTR (Cert. #5366) and AES CMAC (Cert. #5366). Unobfuscating the DEK requires the same Password that was given to PBKDFv2 when the DEK was obfuscated. The authentication strength for the module is determined by the Password. There are more than 10 million (107 ) Password combinations with a minimum length of seven (7) bytes. This lower bound is derived by using only the ASCII decimal digits '0'-'9' in the Password, seven bytes and ten choices per byte. Because the Password may be composed of UTF-8 characters, the length in characters may be fewer than seven. The module enforces the minimum Password length in bytes. UTF-88 character encodings may span from one to four bytes. For UTF-8 characters to supply more combinations of Passwords than the ASCII decimal digits, there must be at least 3.4 variable bits in each encoded byte9 . In a single byte UTF-8 character, there are seven (7) variable bits where we require at least 3.4 to meet the lower bound. In two byte characters, there are eleven (11) variable bits where we require at least 6.8. In three byte characters, there are 16 variable bits where we require at least 10.2. In four byte characters, there are 21 variable bits where we require at least 13.6. Or, to put it a different way, every byte in a UTF-8 character has at least 5 variable bits which is more than the minimum of 3.4 bits necessary to meet the lower bound. Therefore, passwords encoded in seven bytes of UTF-8 characters will 7 Harkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). IETF. (October 2008) 8 https://www.unicode.org/versions/Unicode11.0.0 9 At least 3.32 binary bits are needed to uniquely represent ten distinct values; 23.32 10 ≅ iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 13 of 24 have at least 107 different combinations and the chances of a successful random guess is less than one in 10,000,000 (10-7 ). The module protects against brute-force attempts to guess a rôle's PIN/Password by permitting no more than ten (10) consecutive incorrect guesses before locking out that rôle. Incorrect PIN/Password attempts are counted independently for each rôle. The probability of an attacker correctly guessing a PIN/Password in any time period10 , such as a one-minute interval, is 10-6 or 1 chance in 1,000,000. 10 The FIPS 140-2 standard stipulates that “For multiple attempts to use the authentication mechanism during a one-minute period, the probability shall be less than one in 100,000 (10-5 ) that a random attempt will succeed or a false acceptance will occur. “ In this product, a single successful attempt to guess a PIN/Password has a probability less than one in 10,000,000 (10-7 ). Ten guesses has a probability of one in 1,000,000 (10*10-7 or 10-6 ) of success. The standard requires that the probability of a successful guess be less than one in 100,000 (10-5 ) in a one-minute period. The authentication mechanism of this module is better than the standard requires, over any time interval—including a one-minute period. A probability of one in 1,000,000 (10-6 ) is less likely than one in 100,000 (10-5 ). iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 14 of 24 4 Physical Security The multi-chip standalone cryptographic module includes the following physical security mechanisms, conforming to FIPS 140-2 Level 3 requirements: 1. Production grade components 2. Hard, opaque, tamper-evident enclosure with embedded, hard epoxy covering all security relevant components. Epoxy hardness was tested at ambient temperature and over the module’s documented operating temperature range of 0°C to 60°C. 3. Memory protection enabled to prevent read-out of firmware, RAM, or NVRAM The operator is responsible for inspecting the module on each use for evidence of tampering. If the module is physically compromised it is no longer guaranteed to provide FIPS security guarantees and should be replaced. 5 Operational Environment The FIPS 140-2 Operational Environment (Area 6) requirements for the module are not applicable because the device does not contain a modifiable operational environment. 6 Cryptographic Key Management 6.1 Cryptographic Algorithms iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 15 of 24 Algorithm Modes Key Sizes Reference CAVP Cert. Use AES XTS11 256 NIST SP 800-38E12 AES 5942 Encryption of user data within storage application only AES ECB CMAC CTR 128 256 (ECB only) FIPS 19713 NIST SP 800-38A14 5366 Block cipher basis of CTR-DRBG. Algorithmic basis of SIV. AES ECB GCM 128 FIPS 197 NIST SP 800-38A NIST SP 800-38D15 5397 AES-ECB is the block cipher basis for AES-GCM which is used to encrypt Bluetooth messages CKG - 256 NIST SP-800-13316 Vendor Affirmed The unmodified output of the DRBG is used for generating symmetric keys and asymmetric seeds. DRBG AES-CTR 256 NIST SP 800-90A17 2077 Random number generator for encryption keys and salts ECDSA - P-256 FIPS 186-418 142819 ECC key generation for SP 800-56Ar3 key agreement HMAC HMAC-SHA-1 160 FIPS 198-120 3554 Algorithmic basis of PBKDFv2 KAS-SSC ECC CDH P-256 NIST SP 800-56Ar321 Vendor Affirmed Key agreement for securing Bluetooth messages. Shared secret computation with ECDSA (Cert #1428) as a prerequisite for ECC key pair generation. Key establishment provides 128 bits of encryption strength used to generate the 256 bit Session Master Secret. KBKDF AES-CMAC 128 NIST SP 800-10822 201 Key agreement for securing Bluetooth messages. Derivation of keys for Bluetooth message encryption from the Session Master Secret. KDA One-step KDF 160 NIST SP 800-56Cr123 Vendor Affirmed Key agreement for securing Bluetooth messages. Key derivation algorithm with SHS (SHS Cert #4308) as a prerequisite, used in conjunction with KAS-SSC. PBKDFv2 HMAC-SHA-1 - NIST SP 800-13224 A777 KEK generation. Password is the User/CO Password with a minimum length of 7 characters. The module supports option 1a as documented in SP 800-132 § 5.4. SHS SHA-1 - FIPS 180-425 4308 Algorithmic basis of HMAC-SHA1 11 ECB mode is included in the CAVS certificate, but is used by no services in the module. 12 SP 800-38E – Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices. NIST. (January 2010). 13 FIPS 197 – Advanced Encryption Standard (AES). NIST. (November 2001). 14 SP 800-38A – Recommendation for Block Cipher Modes of Operation: Methods and Techniques. NIST. (December 2001). 15 SP 800-38D – Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. NIST. (November 2007). 16 SP 800-133r2 – Recommendation for Cryptographic Key Generation. NIST. (June 2020). 17 SP 800-90Ar1 – Recommendation for Random Number Generation Using Determinstic Random Bit Generators. NIST. (June 2015). 18 FIPS 186-4 – Digital Signature Standard (DSS). NIST. (July 2013). 19 Certificate #1428 covers only key pair generation. Signature and verification functions are not used. 20 FIPS 198-1 – The Keyed-Hash Message Authentication Code (HMAC). NIST. (July 2008). 21 SP 800-56Ar3 – Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. NIST. (April 2018). 22 SP 800-108 – Recommendation for Key Derivation Using Pseudorandom Functions (Revised). NIST. (October 2009). 23 SP 800-56Cr1 – Recommendation for Key-Derivation Methods in Key-Establishment Schemes. NIST (August 2020). 24 SP 800-132 – Recommendation for Password-Based Key Derivation: Part 1: Storage Applications. NIST. (December 2010). iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 16 of 24 Table 7: FIPS Approved Algorithms Algorithm Strength Use NDRNG Entropy source has a full 256 bits of security strength. Entropy source for seed to CTR-DRBG SIV26 (no security claimed) Per FIPS 140-2 IG §1.23, SIV is a non-approved cryptographic algorithm. It is allowed in FIPS approved mode because it is not a security function. “Cryptographic keys and CSPs encrypted using a non-approved algorithm or proprietary algorithm or method are considered in plaintext form, within the scope of this standard [FIPS 140-2].” SIV uses the CO KEK and User KEK, derived from the CO or User PIN/Password with KBKDFv2, to obfuscate and unobfuscate the stored DEK. Table 8: FIPS Allowed Algorithms 6.2 Critical Security Parameters The module does not input or output private or secret cryptographic keys. Cryptographic keys are established per SP 800-56Ar3 scheme C(0s,2e,ECC_CDH) and conforming to SP 800-133r2. KEKs are derived using PBKDFv227 and are only used as part of the module's data storage application. Public/private key pairs are ephemeral, used for one and only one key agreement, and destroyed immediately after use. 25 FIPS 180-4 – Secure Hash Standard (SHS). NIST. (August 2015). 26 Harkins, D. Synthetic Initialization Vector (SIV) Authenticated Encryption Using the Advanced Encryption Standard (AES). IETF. (October 2008). SIV is a Authenticated Encryption algorithm codified by the IETF in RFC-5297. NIST has not analyzed this algorithm, so it is specified here as non-approved for the purposes of FIPS 140-2. Obfuscation of the DEK depends on the user's PIN/Password and SIV to prevent the plaintext DEK from being stored in NVRAM. NIST characterizes the storage of the DEK as plaintext explicitly because SIV is non-approved. 27 Per FIPS SP800-132 and FIPS140IG § D.6, the materials derived from PBKDFv2 are used only for “protection of electronically-stored data or for the protection of data protection keys.” iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 17 of 24 Parameter Description Source Storage Creation / Destruction CTR-DRBG state (seed, V, key) Generating random values for CSPs 256 bit output (full entropy) NDRNG and CTR-DRBG RAM Created when DRBG is seeded which is every time the module initializes Destroyed on lock, connect, successful generation of CSPs, power-off, and zeroization User Password Input to PBKDFv2 to allow generation of the User KEK Strength of 7-15 bytes Keypad entry RAM Created by User Destroyed on lock, unlock, timeout, and power-off CO Password Input to PBKDFv2 to allow generation of the CO KEK Strength of 7-15 bytes Keypad Entry RAM Created by CO Destroyed on lock, unlock, timeout, and power-off XTS-AES DEK Encryption and decryption of user data XTS-AES 256 bit key CTR-DRBG RAM Created when first password, either User or CO, is set Destroyed on lock, timeout, entering low-power mode, power-off, and zeroization User KEK Obfuscation and unobfuscation of DEK SIV AES 128 bit key User Password, User Salt, and PBKDFv2 RAM Created before obfuscation or unobfuscation of the DEK. Destroyed immediately after use. CO KEK Obfuscation and unobfuscation of DEK SIV AES 128 bit key CO Password, CO Salt, and PBKDFv2 RAM Created before obfuscation or unobfuscation of the DEK. Destroyed immediately after use. ECC-CDH Private Key Bluetooth Message Encryption ECC P-256 256 bit key CTR-DRBG RAM Generated when Bluetooth client requests secure channel Destroyed when secure channel established Session Pre-master Secret Key generated during session negotiation Precursor to Session Master Secret 256 bit secret ECC-CDH Key Agreement RAM Created when secure channel established Destroyed when Session Master Secret created Session Master Secret Bluetooth Message Encryption 256 bit secret ECC-CDH Key Agreement RAM Created when secure channel established Destroyed when secure channel session ends AES-GCM Key / IV Bluetooth Message Encryption AES key 128 bits Session Master Secret and KDF-AES- RAM Created when secure channel established or when secure channel is rekeyed Destroyed when secure channel session ends iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 18 of 24 IV 96 bits CMAC Table 9: Critical Security Parameters Parameter Use Source Storage Creation / Destruction ECC-CDH Public Key Bluetooth Message Encryption ECC P-256 256 bit key ECC Primitive RAM Generated when Bluetooth client requests secure channel Destroyed when secure channel established ECC-CDH Peer Public Key Bluetooth Message Encryption ECC P-256 256 bit key Remote Bluetooth Client RAM Generated when Bluetooth client requests secure channel Destroyed when secure channel established Table 10: Public Security Parameters 6.3 Zeroization of Critical Security Parameters Zeroization is the erasure of CSPs from volatile and non-volatile storage. The module initiates an erase cycle to zeroize CSPs stored in NVRAM. Copies of CSPs in RAM are erased by setting the memory to zeros. This process occurs when the module is factory reset or when the module detects a brute-force attack. There are two kinds of brute-force attacks. Ten consecutive failed attempts to unlock the module as the User is the first type of brute-force attack and will zeroize the User CSPs. After this type of attack, the CO will be able to unlock the module, recover user data, and permit the setup of a new User Password. However, if there is no CO Password, the user data partition will be erased leaving the module in the factory reset state with an erased use data partition. The second kind of brute-force attack is against the CO Password. Ten consecutive failed attempts to unlock the module as CO will zeroize all CSPs for both the CO and User rôles, including the DEK. The module will be left in the factory reset state with an erased user data partition. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 19 of 24 6.3.1 Zeroization via Factory Reset A Factory Reset will erase all CSPs, settings, and user data from the module. After this operation, the operator must initialize the module per section 3.2 to return it to a FIPS approved mode. Starting with the module connected to USB power: 1. Invoke the FactoryReset service. 2. Query Status until operation is complete. 3. Initialize module by creating a new PIN/Password and reformatting the drive. 7 EMI/EMC Regulatory Compliance This module conforms to the EMI/EMC requirements specified by Title 47 of the Code of Federal Regulations, Part 15, Subpart B, Unintentional Radiators, Digital Devices, Class B (i.e., for home use). The module incorporates a Bluetooth radio with FCC ID 2AOXICAUSB which is excluded from the EMI/EMC requirements for FIPS. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 20 of 24 8 Self-Tests When the module powers on, it performs a sequence of self-tests. If any of these tests fails, the drive will enter an error state. The module cannot perform any cryptographic services and is not usable in this state. The module also performs conditional self-tests. The only way to clear a module error state is to cycle the power. Self-tests are summarized in Table 11. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 21 of 24 Test Category Test Name When Executed Failure Indications Firmware Integrity Firmware CRC-32 Module power-on Module illuminates no LEDs. Firmware CRC-16 Module power-on Module fails to mount to host PC after successful unlock and returns to locked state. Known Answer DRBG Cert. #2077 KAT28 s CTR-DRBG Instantiate CTR-DRBG Generate Module power-on LEDs illuminate in continuously circling pattern, red then green then blue. PBKDFv2 Cert. #A777 Combined KAT29 Derivation of Master Key (§5.4) HMAC SHA-1 Cert. #3554 SHA-1 Cert. #4308 Module power-on LEDs illuminate in continuously circling pattern, red then green then blue. AES #5366 KATs AES-ECB-256 encrypt Cert. #5366 AES-ECB-256 decrypt Cert. #5366 AES CMAC Cert. #5366 Module power-on LEDs illuminate in continuously circling pattern, red then green then blue. XTS-AES Cert. #5942 KATs AES-XTS encrypt AES-XTS decrypt Module power-on Module fails to mount to host PC after successful unlock. Module automatically locks and illuminates red LED. AES-GCM Cert. #5397 KATs AES-GCM authenticated encrypt AES-GCM authenticated decrypt Module power-on LEDs illuminate in continuously circling pattern, red then green then blue. KAS KATS KAS-SSC (SP 800-56Ar3) Primitive 'Z' Computation KAT per IG D.8 KDA (SP 800-56Cr1) KDA KAT per IG D.8 KBKDF Cert. #201 (SP 800-108) Module power-on LEDs illuminate in continuously circling pattern, red then green then blue. Conditional ECC Partial Public-Key Validation; Assurance per SP 800-56Ar3 §5.6.2.2.2 Use of SP 800-56Ar3 Key Agreement LEDs illuminate in continuously circling pattern, red then green then blue. NDRNG Conditional Test per FIPS 140-2 AS.09.42 Use of NDRNG LEDs illuminate in continuously circling pattern, red then green then blue. XTS-AES; Key validity per IG A.9 CAVP #AES 5942 Creation of DEK Module fails to mount to host PC after successful unlock. Module automatically locks and illuminates red LED. Table 11: Module Self-Tests 28 KATs are Health tests per section 11.3 of SP800-90A. The CRNGT per section 4.9.2 of FIPS 140-2 is not necessary per IG 9.8. 29 A single KAT for HMAC incorporates the SHA test. iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 22 of 24 9 Mitigation of Other Attacks The module has not been designed to mitigate attacks not addressed by the security requirements of FIPS 140-2. 10 Glossary of Terms and Acronyms Term Definition AES Advanced Encryption Standard AES-GCM AES Galois Counter Mode cipher used to encrypt Bluetooth messages CO Cryptographic Officer CRC Cyclic Redundancy Check CSP Critical Security Parameter CTR-DRBG Counter-Mode Deterministic Random Byte Generator DEK Data Encryption Key DRBG Deterministic Random Byte Generator ECB Electronic Code Book ECC Elliptical Curve Cryptography ECC-CDH ECC Cofactor Diffie Hellman EMC Electromagnetic Compatibility EMI Electromagnetic Interference FIPS Federal Information Processing Protocol HMAC Keyed-Hash Message Authentication Code KAT Known Answer Test KDF Key Derivation Function KEK Key Encryption Key LED Light Emitting Diode NDRNG Non-deterministic Random Number Generator; module entropy source NIST National Institute of Standards and Technology iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 23 of 24 NVRAM Non-volatile Random Access Memory PBKDFv2 Password Based Key Derivation Algorithm Version 2 Password User's secret authentication character sequence RAM Random Access Memory Salt Random value used to improve security of cryptographic algorithms SATA Serial AT Attachment SHA-1 Secure Hash Algorithm 1 SHS Secure Hash Standard SIV Synthetic Initialization Vector USB Universal Serial Bus XTS-AES AES cipher mode used to encrypt user data in mass storage Zeroization The process of erasing cryptographic security keys and parameters iStorage datAshur BT FIPS 140-2 Level 3 Non-Proprietary Security Policy Version 1.0 Copyright © 2021 ClevX, LLC. Prepared by ClevX, LLC on behalf of iStorage Ltd. This document may be freely reproduced and distributed only in its entirety and without modification. Page 24 of 24