© 2024 Senetas Corporation Ltd. All rights reserved. SP-CE Crypto Module-v1.01 Once released this document may be freely reproduced and distributed whole and intact including this copyright notice. www.senetas.com Senetas Corporation Ltd., distributed by Thales SA CE Crypto Module Module Version: 5.5.0 FIPS 140-3 Non-Proprietary Security Policy Level 1 Validation September 2024 Senetas Corp. Ltd. Version 1.01 Page 2 of 27 CE Crypto Module Non-Proprietary Security Policy Document History Authors Date Version Comment Senetas Corp. Ltd. 22-Dec-2023 1.00 CMVP Release for firmware version 5.5.0 Senetas Corp. Ltd. 04-Sep-2024 1.01 Interim validation update Senetas Corp. Ltd. Version 1.01 Page 3 of 27 CE Crypto Module Non-Proprietary Security Policy Table of Contents Document History......................................................................................................................................................2 1. General..................................................................................................................................................................4 1.1 References .....................................................................................................................................................5 1.2 Acronyms and Abbreviations .........................................................................................................................6 1.3 Security Levels ...............................................................................................................................................7 2. Cryptographic Module Specification......................................................................................................................8 2.1 Operational Environment................................................................................................................................8 2.2 Modes of Operation........................................................................................................................................8 2.3 Cryptographic Algorithms...............................................................................................................................9 Approved Algorithms...............................................................................................................................9 2.4 Cryptographic Boundary...............................................................................................................................11 3. Cryptographic Module Interfaces ........................................................................................................................12 4. Roles, Services and Authentication.....................................................................................................................13 4.1 Supported Roles...........................................................................................................................................13 4.2 Roles and Services ......................................................................................................................................14 Approved Services................................................................................................................................14 5. Software/Firmware Security ................................................................................................................................16 5.1 Software/Firmware Integrity Test .................................................................................................................16 On Demand Software/Firmware Integrity Test .....................................................................................16 6. Operational Environment.....................................................................................................................................17 7. Physical Security .................................................................................................................................................18 8. Non-Invasive Security..........................................................................................................................................19 9. Sensitive Security Parameter Management........................................................................................................20 9.1 Cryptographic Keys and SSPs.....................................................................................................................20 9.2 Random Number Generation/Entropy..........................................................................................................23 10. Self-tests..............................................................................................................................................................24 10.1 Pre-Operational Self-Tests...........................................................................................................................24 10.2 Conditional Self-tests ...................................................................................................................................24 10.3 On-Demand and Periodic Self-tests.............................................................................................................24 10.4 Error State ....................................................................................................................................................24 11. Life-cycle Assurance ...........................................................................................................................................26 12. Mitigation of Other Attacks ..................................................................................................................................27 Senetas Corp. Ltd. Version 1.01 Page 4 of 27 CE Crypto Module Non-Proprietary Security Policy 1. General This is a non-proprietary FIPS 140-3 Security Policy for the Senetas Corporation Ltd. CE Crypto Module v.5.5.0. This Security Policy specifies the security rules under which the module operates to meet the FIPS 140-3 Level 1 requirements. The CE Crypto Module is used in a range of Senetas encryption appliances. The vendor distributes under their own Senetas brand, and jointly with their master worldwide distributor, Thales SA. FIPS 140-3 (Federal Information Processing Standards Publication 140-3), Security Requirements for Cryptographic Modules, specifies the security requirements for a cryptographic module utilized within a security system protecting sensitive but unclassified information. Based on four security levels for cryptographic modules, this standard identifies requirements in twelve sections. For more information about the NIST/CCCS Cryptographic Module Validation Program (CMVP) and the FIPS 140-3 standard, visit www.nist.gov/cmvp . This Security Policy, using the terminology contained in the FIPS 140-3 specification, describes how the CE Crypto Module complies with the twelve sections of the standard. In this document, the CE Crypto Module is more generally referred to as “the module”. This Security Policy contains only non-proprietary information. Any other documentation associated with FIPS 140- 3 conformance testing and validation is proprietary and confidential to Senetas Corporation Ltd. and is releasable only under appropriate non-disclosure agreements. For more information describing the module and associated platforms, visit http://www.senetas.com. Senetas Corp. Ltd. Version 1.01 Page 5 of 27 CE Crypto Module Non-Proprietary Security Policy 1.1 References For more information on the FIPS 140-3 standard and validation program please refer to the National Institute of Standards and Technology website at www.nist.gov/cmvp. The following standards from NIST are all available via the URL: www.nist.gov/cmvp . [1] FIPS PUB 140-3: Security Requirements for Cryptographic Modules. [2] NIST Special Publication (SP) 800-140 FIPS 140-3 Derived Test Requirements (DTR). [3] NIST Special Publication (SP) 800-140A CMVP Documentation Requirements. [4] NIST Special Publication (SP) 800-140B CMVP Security Policy Requirements. [5] NIST Special Publication (SP) 800-140Crev2 CMVP Approved Security Functions. [6] NIST Special Publication (SP) 800-140Drev2 CMVP Approved Sensitive Security Parameter Generation and Establishment Methods. [7] NIST Special Publication (SP) 800-140E CMVP Approved Authentication Mechanisms. [8] NIST Special Publication (SP) 800-140F CMVP Approved Non-Invasive Attack Mitigation Test Metrics. [9] ISO/IEC 19790:2012(E), Information technology — Security techniques — Security requirements for cryptographic modules. [10] ISO/IEC 24759:2017(E), Information technology — Security techniques — Test requirements for cryptographic modules. [11] NIST Implementation Guidance for FIPS 140-3 and the Cryptographic Module Validation Program. [12] Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197. [13] Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-4. [14] Secure Hash Standard (SHS), Federal Information Processing Standards Publication 180-4. [15] NIST Special Publication (SP) 800-131Arev2, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. [16] NIST Special Publication (SP) 800-90Arev1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators. [17] NIST Special Publication (SP) 800-56Arev3 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography. [18] Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-4. [19] NIST Special Publication (SP) 800-56Brev2, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography. [20] NIST Special Publication (SP) 800-108rev1 Recommendation for Key Derivation Using Pseudorandom Functions. [21] NIST Special Publication (SP) 800-56Crev2 Recommendation for Key-Derivation Methods in Key Establishment Schemes. [22] NIST Special Publication (SP) 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation. [23] NIST Special Publication (SP) 800-133rev2, Recommendation for Cryptographic Key Generation. [24] NIST Special Publication (SP) 800-67rev2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. [25] NIST Special Publication (SP) 800-135rev1, Recommendation for Existing Application-Specific Key Derivation Functions Senetas Corp. Ltd. Version 1.01 Page 6 of 27 CE Crypto Module Non-Proprietary Security Policy 1.2 Acronyms and Abbreviations AES Advanced Encryption Standard AES-NI Advanced Encryption Standard New Instructions API Application Programming Interface CBC Cipher Block Chaining CCCS Canadian Centre for Cyber Security CFB Cipher Feedback CAVP Cryptographic Algorithm Validation Program CMVP Cryptographic Module Validation Program CNF Cloud Network Function CSP Critical Security Parameter CTR Counter Mode DH Diffie-Hellman DRBG Deterministic Random Bit Generator ECC Elliptic Curve Cryptography ECDH Elliptic Curve Diffie-Hellman ECDSA Elliptic Curve Digital Signature Algorithm ESV(NP) Non-Physical Entropy Source ESV Entropy Source Validation FIPS Federal Information Processing Standard GCM Galois Counter Mode HMAC Keyed-Hash Message Authentication Code IV Initialisation Vector KAS-ECC Elliptic Curve Key Agreement Scheme (ECDH) KAS-FCC Finite Field Key Agreement Scheme (DH) KAT Known Answer Test KDF Key Derivation Function NIST National Institute of Standards and Technology NVLAP National Voluntary Laboratory Accreditation Program OAEP Optimal Asymmetric Encryption Padding PAA Processor Algorithm Accelerator PKCS Public Key Cryptography Standards PSP Public Security Parameter PUB Publication RAM Random Access Memory RNG Random Number Generator RSA Rivest Shamir and Adleman Public Key Algorithm SP Special Publication SHA Secure Hash Algorithm SSP Sensitive Security Parameter TOEPP Tested Operational Environment Physical Perimeter VNF Virtual Network Function Senetas Corp. Ltd. Version 1.01 Page 7 of 27 CE Crypto Module Non-Proprietary Security Policy 1.3 Security Levels The module meets the overall Security Level 1 requirements for FIPS 140-3. See Table 1 below, which indicates the security level of each of the twelve sections of the FIPS 140-3 standard. Table 1 Security Levels ISO/IEC 24759 Section 6 [Number Below] FIPS 140-3 Section Title Security Level 1 General 1 2 Cryptographic Module Specification 1 3 Cryptographic Module Interfaces 1 4 Roles, Services and Authentication 1 5 Software/Firmware Security 1 6 Operational Environment 1 7 Physical Security 1 8 Non-invasive Security N/A 9 Sensitive Security Parameter Management 1 10 Self-tests 1 11 Life Cycle Assurance 1 12 Mitigation of Other Attacks N/A Senetas Corp. Ltd. Version 1.01 Page 8 of 27 CE Crypto Module Non-Proprietary Security Policy 2. Cryptographic Module Specification The CE Crypto Module version 5.5.0 is a firmware cryptographic module running on a multi-chip standalone general-purpose compute platform. The module provides low-level cryptographic primitives to the overall platform and its functions. The Module exists as a number of shared libraries and is linked against various encryption applications to supply all cryptographic operations as required by those applications. 2.1 Operational Environment The module has been tested by the certification lab, Lightship Security, Inc. on the following platform with and without PAA: Table 2 Tested Operational Environments # Operating System Hardware Platform Processor PAA/Acceleration 1 Debian Linux v11 Dell VEP4600 Intel Xeon D-2145NT (Skylake) AES-NI In addition to the platforms listed in Table 2 above, Senetas Corporation has also tested the module on the following platforms and claims vendor affirmation on them: Table 3 Vendor Affirmed Operational Environments # Operating System Hardware Platform 1 Debian Linux v11 Dell VEL1485 with Intel Atom C3000 (Goldmont) CPU 2 Debian Linux v11 CONTEC CPS-BXC-200 with Intel Atom x7-E3950 CPU 3 Debian Linux v11 (VNF/CNF) Dell VEP4600 with Intel Xeon D-2145NT (Skylake) CPU Note: The CMVP makes no statement as to the correct operation of the module or the security strengths of the generated keys when ported onto an Operating Environment that is not listed on the validation certificate. 2.2 Modes of Operation The module only supports an approved mode of operation. Senetas Corp. Ltd. Version 1.01 Page 9 of 27 CE Crypto Module Non-Proprietary Security Policy 2.3 Cryptographic Algorithms Approved Algorithms Table 4 lists the approved security functions of the module in the approved mode of operation. There are algorithms, modes, and key/moduli sizes that have been CAVP-tested but are not used by any approved service of the module. Only the algorithms, modes/methods, and key lengths/curves/moduli shown in this table are used by an approved service of the module. Table 4 Approved Algorithms CAVP Cert Algorithm and Standard Mode/Method Description/ Key Size(s)/ Key Strength(s) Use/ Function A4648 AES FIPS PUB 197, SP 800-38A SP 800-38D CFB128 (e/d; 128,256) CTR (e; 128, 256) ECB1 (e/d; 128, 256) CBC (e/d; 128,256) GCM (e/d; 128,256 Internal IV, AAD=0 to 256) 128-bit 256-bit Symmetric Encryption and Decryption A4648 RSA FIPS186-4 KeyGen; MOD: 2048 ALG[RSASSA-PKCS1_V1_5]; SigGen; MOD: 2048 SHS: SHA-256 SigVer; MOD: 2048 SHS: SHA-256, SHA-384 and SHA- 512 SigVer; MOD: 4096 SHS: SHA-256, SHA-384 and SHA- 512 2048-bit 4096-bit Asymmetric Key Generation, Digital Signature Generation and Verification A4648 ECDSA FIPS186-4 KeyGen KeyVer SigGen SigVer P-256 P-384 P-521 Asymmetric Key Generation, Digital Signature Generation and Verification A4648 KAS-ECC SP 800-56Arev3 (Cofactor) Ephemeral Unified Model key agreement NIST P-256, P-384 and P-521 curves are supported and SHA-256, SHA-384 and SHA-512 (respectively) are used for key derivation Key establishment methodology provides between 128 and 256 bits of encryption strength Key Agreement A4648 KAS-FFC SP 800-56Arev3 dhEphem key agreement MODP-2048 bit Oakley Group 14 using SHA-256 for key derivation Key establishment methodology provides 112 bits of encryption strength Key Agreement A4648 SHA FIPS 180-4 SHA-1 (BYTE only) SHA-256 (BYTE only) SHA-384 (BYTE only) SHA-512 (BYTE only) Message Digest A4648 HMAC HMAC-SHA-1 Key Sizes Ranges Tested: KS