This page was not yet optimized for use on mobile
devices.
Apple iOS CoreCrypto Kernel Module v6.0
Certificate #2609
Webpage information
Security policy
Symmetric Algorithms
AES, AES-128, AES-, AES-192, AES-256, CAST5, RC2, RC4, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD4, MD5, RIPEMD, PBKDFSchemes
MAC, Key Agreement, Key agreementProtocols
TLSRandomness
TRNG, DRBG, RNGElliptic Curves
P-256, P-384, P-192, P-224, P-521, curve P-384, Ed25519Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
level 1, Level 2Standards
FIPS 140-2, FIPS 180-4, FIPS 197, FIPS PUB 140-2, FIPS 46-3, FIPS186-4, FIPS 186-4, FIPS 198, FIPS 186-2, SP 800-90, SP 800-38, SP 800-67, SP 800-38A, SP 800-132, SP 800-38D, NIST SP 800-90A, PKCS7, PKCS3, PKCS #1, PKCS#1, RFC6637, RFC 6637File metadata
| Title | FIPS 140-2 Non-Proprietary Security Policy |
|---|---|
| Keywords | FIPS 140-2, FSM |
| Author | Renaudt Nuñez |
| Creation date | D:20160329182451-05'00' |
| Modification date | D:20160329182451-05'00' |
| Pages | 29 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 2609,
"dgst": "b171875a25de1c92",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#3733",
"SHS#3016",
"AES#3744",
"HMAC#2355",
"HMAC#2450",
"SHS#3112",
"ECDSA#791",
"SHS#3117",
"SHS#3015",
"SHS#3114",
"SHS#3018",
"SHS#3111",
"HMAC#2443",
"KTS#3736",
"DRBG#1026",
"DRBG#1025",
"AES#3729",
"Triple-DES#2083",
"KTS#3737",
"AES#3732",
"Triple-DES#2082",
"KTS#3741",
"AES#3743",
"ECDSA#798",
"SHS#3118",
"HMAC#2451",
"KTS#3735",
"SHS#3119",
"RSA#1924",
"SHS#3023",
"KTS#3732",
"ECDSA#796",
"Triple-DES#2085",
"AES#3737",
"RSA#1926",
"ECDSA#792",
"AES#3734",
"Triple-DES#2084",
"KTS#3739",
"RSA#1918",
"AES#3739",
"HMAC#2353",
"DRBG#1021",
"SHS#3115",
"SHS#3022",
"SHS#3020",
"RSA#1925",
"KTS#3742",
"HMAC#2449",
"HMAC#2349",
"AES#3741",
"KTS#3746",
"ECDSA#800",
"Triple-DES#2079",
"AES#3745",
"AES#3730",
"ECDSA#797",
"RSA#1922",
"SHS#3017",
"AES#3738",
"HMAC#2356",
"HMAC#2352",
"KTS#3745",
"HMAC#2445",
"RSA#1921",
"KTS#3733",
"KTS#3729",
"SHS#3019",
"KTS#3730",
"SHS#3021",
"KTS#3731",
"KTS#3734",
"HMAC#2448",
"KTS#3744",
"HMAC#2357",
"AES#3742",
"AES#3735",
"SHS#3116",
"ECDSA#794",
"HMAC#2442",
"RSA#1927",
"DRBG#1022",
"ECDSA#799",
"Triple-DES#2081",
"HMAC#2447",
"Triple-DES#2077",
"HMAC#2354",
"AES#3747",
"KTS#3743",
"Triple-DES#2080",
"DRBG#1018",
"DRBG#1020",
"DRBG#1017",
"AES#3746",
"RSA#1923",
"ECDSA#795",
"SHS#3120",
"DRBG#1023",
"KTS#3747",
"AES#3736",
"DRBG#1024",
"HMAC#2351",
"AES#3731",
"HMAC#2350",
"Triple-DES#2076",
"RSA#1919",
"KTS#3738",
"HMAC#2446"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"6.0"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 1
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 6
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 4
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 1
},
"NIST": {
"P-192": 16,
"P-224": 12,
"P-256": 8,
"P-384": 7,
"P-521": 16,
"curve P-384": 1
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"AES-128": 4,
"AES-192": 1,
"AES-256": 1,
"HMAC-SHA-1": 2,
"HMAC-SHA-224": 2,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"HMAC-SHA256": 2,
"PKCS #1": 1,
"PKCS#1": 3,
"PKCS3": 2,
"PKCS7": 2,
"RSA PKCS #1": 1,
"RSA PKCS#1": 1,
"RSA PKCS1-v1_5": 1,
"SHA-1": 7,
"SHA-2": 1,
"SHA-2( 224": 4,
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2,
"SHA1": 1
}
},
"fips_security_level": {
"Level": {
"Level 2": 1,
"level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 2
}
},
"PBKDF": {
"PBKDF": 3
},
"RIPEMD": {
"RIPEMD": 2
},
"SHA": {
"SHA1": {
"SHA-1": 7,
"SHA1": 1
},
"SHA2": {
"SHA-2": 5,
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 10
},
"RNG": {
"RNG": 2
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 21,
"FIPS 180-4": 2,
"FIPS 186-2": 1,
"FIPS 186-4": 1,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS 46-3": 1,
"FIPS PUB 140-2": 1,
"FIPS186-4": 1
},
"NIST": {
"NIST SP 800-90A": 1,
"SP 800-132": 1,
"SP 800-38": 4,
"SP 800-38A": 1,
"SP 800-38D": 1,
"SP 800-67": 1,
"SP 800-90": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS3": 1,
"PKCS7": 1
},
"RFC": {
"RFC 6637": 1,
"RFC6637": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 15,
"AES-": 1,
"AES-128": 4,
"AES-192": 1,
"AES-256": 1
},
"CAST": {
"CAST5": 2
},
"RC": {
"RC2": 2,
"RC4": 2
}
},
"DES": {
"3DES": {
"Triple-DES": 11
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 9,
"HMAC-SHA-224": 1,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Renaudt Nu\u00f1ez",
"/CreationDate": "D:20160329182451-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "FIPS 140-2, FSM",
"/ModDate": "D:20160329182451-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "FIPS 140-2 Non-Proprietary Security Policy",
"pdf_file_size_bytes": 630460,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/standards.html",
"http://csrc.nist.gov/groups/STM/cavp/index.html",
"http://csrc.nist.gov/groups/STM/cmvp/index.html",
"http://developer.apple.com/library/ios/#documentation/Miscellaneous/Conceptual/iPhoneOSTechOverview/Introduction/Introduction.html#//apple_ref/doc/uid/TP40007898"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "83f899214d96a27c889fbfeec19faf28515a04064e3aacb56321a98b698d80ab",
"policy_txt_hash": "3bf2c7565167e2e8a94341814790f413efe8460330c79071a4b1c561ce8dc475"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertApril2016.pdf",
"date_sunset": null,
"description": "The Apple iOS CoreCrypto Kernel Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Apple iOS CoreCrypto Kernel Module v6.0",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "6.0",
"tested_conf": [
"iOS 9.0 running on iPad (3rd generation) with Apple A5X CPU",
"iOS 9.0 running on iPad (4th generation) with Apple A6X CPU",
"iOS 9.0 running on iPad Air 2 with Apple A8X CPU",
"iOS 9.0 running on iPhone4S with Apple A5 CPU",
"iOS 9.0 running on iPhone5 with Apple A6 CPU",
"iOS 9.0 running on iPhone5S with Apple A7 CPU",
"iOS 9.0 running on iPhone6 (iPhone6 and iPhone6 Plus) with Apple A8 CPU",
"iOS 9.0 running on iPhone6S (iPhone6S and iPhone6S Plus) with Apple A9 CPU",
"iOS 9.1 running on iPad Pro with Apple A9X CPU (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2016-04-05",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-03-11",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Apple Inc.",
"vendor_url": "http://www.apple.com"
}
}