Samsung Kernel Cryptographic Module

Certificate #4097

Webpage information

Status active
Validation dates 11.12.2021 , 22.06.2022 , 08.11.2022
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Physical Security: N/A
  • EMI/EMC: Level 3
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.
Tested configurations
  • Linux Kernel 4.19 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 with PAA, Linux Kernel 4.19 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 without PAA, Linux Kernel 4.19 running on Samsung Watch4 Classic with Samsung Electronics Exynos W920 with PAA, Linux Kernel 4.19 running on Samsung Watch4 Classic with Samsung Electronics Exynos W920 without PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Samsung Electronics Exynos 2100 with PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Samsung Electronics Exynos 2100 without PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 with PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 without PAA, Linux Kernel 5.10 running on Samsung Galaxy A53 with Samsung Electronics Exynos 1280 with PAA, Linux Kernel 5.10 running on Samsung Galaxy A53 with Samsung Electronics Exynos 1280 without PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Samsung Electronics Exynos 2200 with PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Samsung Electronics Exynos 2200 without PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Qualcomm Snapdragon 898 with PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Qualcomm Snapdragon 898 without PAA
  • Linux Kernel 5.10 running on Samsung Galaxy Z Flip 4 with Qualcomm Snapdragon 8+ Gen 1 with PAA
  • Linux Kernel 5.10 running on Samsung Galaxy Z Flip 4 with Qualcomm Snapdragon 8+ Gen 1 without PAA (single-user mode)
  • Linux Kernel 5.4 running on Samsung Galaxy XCover6 Pro with Qualcomm Snapdragon 778G with PAA
  • Linux Kernel 5.4 running on Samsung Galaxy XCover6 Pro with Qualcomm Snapdragon 778G without PAA
Vendor Samsung Electronics Co., Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, Twofish, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, MD5
Schemes
MAC
Randomness
DRBG, RNG
Block cipher modes
ECB, CBC, CTR, GCM

Vendor
Samsung, Qualcomm

Security level
Level 1, level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 197, FIPS 198-1, FIPS 180-4, SP 800-38A, SP 800-67, SP 800-38D, RFC 4106, RFC 4543

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Subject Samsung Kernel Cryptographic Module
Author Hedy
Creation date D:20220817164110-04'00'
Modification date D:20220817164110-04'00'
Pages 22
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4097,
  "dgst": "95807b29ae7ff1c0",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#A969",
        "SHS#A970",
        "HMAC#A970",
        "AES#A1456",
        "SHS#A1455",
        "HMAC#A1455",
        "AES#A969",
        "SHS#A1456",
        "AES#A970",
        "AES#A1455",
        "HMAC#A1456",
        "SHS#A969"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 11
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "UL": {
          "UL Verification Services": 1
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128, 192 and 256": 1,
          "AES GCM1": 1,
          "AES key (128": 1,
          "AES1": 2,
          "DRBG2": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 4,
          "HMAC-SHA-256": 8,
          "HMAC-SHA-384": 2,
          "HMAC-SHA-512": 2,
          "SHA- 256": 1,
          "SHA-1": 15,
          "SHA-224": 15,
          "SHA-256": 15,
          "SHA-384": 8,
          "SHA-512": 7,
          "SHA-512 112": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-224": 15,
            "SHA-256": 15,
            "SHA-384": 8,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 15,
          "FIPS 180-4": 3,
          "FIPS 197": 3,
          "FIPS 198-1": 3,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-38A": 2,
          "SP 800-38D": 1,
          "SP 800-67": 1
        },
        "RFC": {
          "RFC 4106": 2,
          "RFC 4543": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 27
          },
          "Twofish": {
            "Twofish": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 17,
            "HMAC-SHA-224": 2,
            "HMAC-SHA-256": 4,
            "HMAC-SHA-384": 1,
            "HMAC-SHA-512": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 15
        },
        "Samsung": {
          "Samsung": 73
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Hedy",
      "/CreationDate": "D:20220817164110-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220817164110-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Samsung Kernel Cryptographic Module",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "pdf_file_size_bytes": 529712,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/publications/detail/fips/140/2/final",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402DTR.pdf",
          "https://doi.org/10.6028/NIST.SP.800-38D",
          "https://fccid.io/Test-Firm/PCTEST-Engineering-Laboratory-LLC",
          "https://www.kernel.org/doc/Documentation/crypto/api-intro.txt",
          "https://csrc.nist.gov/publications/detail/fips/197/final",
          "https://doi.org/10.6028/NIST.SP.800-67r1",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Module-Validation-Program/documents/fips140-2/FIPS1402IG.pdf",
          "https://doi.org/10.6028/NIST.SP.800-90Ar1",
          "http://www.linuxjournal.com/article/6451?page=0,0",
          "https://csrc.nist.gov/publications/detail/fips/198/1/final",
          "https://csrc.nist.gov/publications/detail/fips/180/4/final"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "c78eb216aace6a36bb73f62f5b055ef32794228b057548115c04469b3a0519e7",
    "policy_txt_hash": "470ce7622644a150fcc722d656f1b7c3437efbacd0afe945a88a698cc92d67b0"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "Provides general purpose cryptographic services to services in the Linux kernel and user-space applications, intended to protect data in transit and at rest.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A",
      "EMI/EMC: Level 3",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Samsung Kernel Cryptographic Module",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "2.2",
    "tested_conf": [
      "Linux Kernel 4.19 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 with PAA, Linux Kernel 4.19 running on Samsung Galaxy A52 with Qualcomm Snapdragon 750 without PAA, Linux Kernel 4.19 running on Samsung Watch4 Classic with Samsung Electronics Exynos W920 with PAA, Linux Kernel 4.19 running on Samsung Watch4 Classic with Samsung Electronics Exynos W920 without PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Samsung Electronics Exynos 2100 with PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Samsung Electronics Exynos 2100 without PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 with PAA, Linux Kernel 5.4 running on Samsung Galaxy S21+ with Qualcomm Snapdragon 888 without PAA, Linux Kernel 5.10 running on Samsung Galaxy A53 with Samsung Electronics Exynos 1280 with PAA, Linux Kernel 5.10 running on Samsung Galaxy A53 with Samsung Electronics Exynos 1280 without PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Samsung Electronics Exynos 2200 with PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Samsung Electronics Exynos 2200 without PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Qualcomm Snapdragon 898 with PAA, Linux Kernel 5.10 running on Samsung Galaxy S22+ with Qualcomm Snapdragon 898 without PAA",
      "Linux Kernel 5.10 running on Samsung Galaxy Z Flip 4 with Qualcomm Snapdragon 8+ Gen 1 with PAA",
      "Linux Kernel 5.10 running on Samsung Galaxy Z Flip 4 with Qualcomm Snapdragon 8+ Gen 1 without PAA (single-user mode)",
      "Linux Kernel 5.4 running on Samsung Galaxy XCover6 Pro with Qualcomm Snapdragon 778G with PAA",
      "Linux Kernel 5.4 running on Samsung Galaxy XCover6 Pro with Qualcomm Snapdragon 778G without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-12-11",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-06-22",
        "lab": "Gossamer Security Solutions",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2022-11-08",
        "lab": "Gossamer Security Solutions",
        "validation_type": "Update"
      }
    ],
    "vendor": "Samsung Electronics Co., Ltd.",
    "vendor_url": "http://www.samsung.com/"
  }
}