ZCM-100 Security Policy Rev. 1.2 ZyFLEX Crypto Module ZCM-100 Non-Proprietary Security Policy Rev. 1.2 ZyFLEX Technologies Inc. ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 1 Revisions Date Rev. Author Note Jul. 29, 2011 0.1 Nick Tseng Initial Draft Aug. 29, 2011 1.0 Nick Tseng Rev. 1.0 First Release Nov. 11, 2011 1.1 Nick Tseng Responses to comments Feb. 17, 2012 1.2 Nick Tseng Responses to CMVP comments ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 2 Contents REVISIONS..........................................................................................................1 CONTENTS..........................................................................................................2 FIGURES..............................................................................................................4 TABLES................................................................................................................5 1. INTRODUCTION........................................................................................6 1.1. DOCUMENT PURPOSE ............................................................................6 1.2. MODULE OVERVIEW..............................................................................6 1.3. MODULE SPECIFICATION........................................................................6 2. SECURITY LEVEL.....................................................................................9 3. MODES OF OPERATION.........................................................................10 3.1. FIPS APPROVED MODE OF OPERATION ...............................................10 3.2. FIPS APPROVED SECURITY FUNCTIONS ..............................................10 3.3. OTHER ALLOWED SECURITY FUNCTIONS ............................................11 4. PORTS AND INTERFACES .....................................................................12 4.1. PHYSICAL PORTS .................................................................................12 4.2. LOGICAL INTERFACES..........................................................................13 5. IDENTIFICATION AND AUTHENTICATION POLICY........................15 5.1. CRYPTO OFFICER (CO) ROLE ..............................................................15 5.2. USER ROLE..........................................................................................15 5.3. AUTHENTICATION................................................................................16 ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 3 6. ACCESS CONTROL POLICY AND KEY MANAGEMENT.................17 6.1. DESCRIPTIONS OF SERVICES ................................................................17 6.2. ROLES, SERVICES AND ACCESS RIGHTS ...............................................19 6.3. KEYS AND CSPS MANAGEMENT..........................................................21 6.4. ZEROIZATIONS .....................................................................................24 7. PHYSICAL SECURITY POLICY.............................................................25 8. OPERATIONAL ENVIRONMENT ..........................................................26 9. SELF-TESTS..............................................................................................27 9.1. POWER-UP TEST..................................................................................27 9.2. CONDITIONAL TEST .............................................................................27 10. DESIGN ASSURANCE.............................................................................28 11. MITIGATION OF OTHER ATTACKS POLICY......................................29 12. CRYPTO OFFICER AND USER GUIDANCE ........................................30 12.1. USER GUIDANCE .................................................................................30 12.2. CRYPTO OFFICER GUIDANCE...............................................................30 13. REFERENCES & ACRONYMS ...............................................................31 ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 4 Figures Figure 1 ZCM-100 Photos ...............................................................................7 Figure 2 ZCM-100 Hardware Block Diagram .................................................7 Figure 3 ZCM-100 Connectors ......................................................................12 ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 5 Tables Table 1 – Security Level per FIPS 140-2 Areas....................................................9 Table 2a – FIPS Approved Security Functions...................................................11 Table 2b – Other Allowed Security Functions....................................................11 Table 3 – Physical Port J1...................................................................................12 Table 4 – Physical Port J2...................................................................................13 Table 5 – Logical Interfaces................................................................................14 Table 6 – Roles, Identities and Authentication ...................................................16 Table 7 – Strengths of Authentication Mechanism.............................................16 Table 8 – Services ...............................................................................................19 Table 9 – Access Rights ......................................................................................20 Table 10 – Keys and CSPs Management............................................................24 ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 6 1. INTRODUCTION 1.1. Document Purpose This document contains the Security Policy, User Guidance and Crypto Officer Guidance for the ZyFLEX Crypto Module ZCM-100, hereinafter referred to as ZCM-100 or the module. 1.2. Module Overview ZCM-100 (Firmware Version: 1.1; Hardware Version: AAM) is a hardware multichip embedded module that targets high speed data link layer (OSI layer 2) secure data transmission applications in an IP-based network. ZCM-100 implements AES-256 encryption/decryption algorithm and other security functions by using both hardware FPGA circuitry and a 32-bit microcontroller. Its miniaturized size and low power consumption features make ZCM-100 suitably fit in a portable wireless communication device such as a handheld radio. ZCM-100 is designed to conform to level 3 of FIPS 140-2 standard. Please visit http://csrc.nist.gov/publicationss/fips/fips140-2/fips1402.pdf for details about the standard. 1.3. Module Specification Figure 1 shows photos of ZCM-100, with all of its interfaces provided through two 20-pin board-to-board connectors J1 & J2. Pin-outs of these connectors are described in section 4.1. ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 7 J2 J1 Figure 1: ZCM-100 Photos. Left: Top-view, Right: Bottom-view Control Input Status Output Key Access Plaintext Data Plaintext Data Ciptertext Data Ciptertext Data Removed Detect Power Signal External Battery Removed Detect Figure 2: ZCM-100 Hardware Block Diagram ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 8 Figure 2 is a hardware block diagram showing ZCM-100’s internal circuitry. ZCM-100 needs to be mounted on a host system board where a “host” microprocessor acts as a master device to send control commands as well as plaintext/ciphertext data to ZCM-100. The host system board also provides power inputs (DC3.3V, 1.2V and a battery voltage of 3.3V) to ZCM-100. ZCM-100 uses an FPGA to implement the AES-256 cryptographic algorithm (the AES Core). Besides, there is a 32-bit microprocessor designed within the FPGA, and this microprocessor acts as a slave device to respond to the host system’s commands and provides some other cryptographic services such as: 1. AES 256 encryption & decryption 2. Key storage 3. Signature generation and verification 4. Generation of message digest The keys and CSPs are stored in the Key & CSP storage memory provided by a logic device, whose power is backed-up by an external battery voltage of 3.3V. ZCM-100 features a secure tamper detection design: when it is being tried to be removed from the host system board, its tamper detector circuitry will automatically zeroize all the keys stored inside ZCM-100 even when power is cut off. For physical ports/logical interfaces descriptions of ZCM-100, please refer to sections 4.1 & 4.2. ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 9 2. SECURITY LEVEL ZCM-100 meets the overall requirements applicable to FIPS140-2 Security Level 3. In the individual requirement areas of FIPS 140-2 the following Security Level ratings are achieved: Area Area Title Level 1 Cryptographic Module Specification 3 2 Cryptographic Module Ports and Interfaces 3 3 Roles, Services, and Authentication 3 4 Finite State Model 3 5 Physical Security 3 6 Operational Environment N/A 7 Cryptographic Key Management 3 8 EMI/EMC 3 9 Self-tests 3 10 Design Assurance 3 11 Mitigation of Other Attacks N/A Table 1 – Security Level per FIPS 140-2 Areas ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 10 3. MODES OF OPERATION 3.1. FIPS Approved Mode of Operation When ZCM-100 powers up, it will execute self-test first; if the self-test passes ZCM-100 will issue a status report indicating that it is entering the login state and operating in the FIPS Approved mode automatically, without any operator’s intervention. ZCM-100 only operates in a FIPS Approved mode of operation, comprising all services described in section 6.1. The module does not implement bypass or maintenance modes. 3.2. FIPS Approved Security Functions The following table gives the list of FIPS Approved security functions provided by the module. Security Function Details CAVP Cert. # DSA FIPS 186-3: SIG(gen) [(1024,160) SHA (1,224,256,384,512);(2048,224) SHA(1,224,256,384,512); (2048,256) SHA(1,224,256,384,512); (3072,256) SHA(1,224,256,384,512)] SIG(ver) [(1024,160) SHA (1,224,256,384,512);(2048,224) SHA(1,224,256,384,512); (2048,256) SHA(1,224,256,384,512); (3072,256) SHA(1,224,256,384,512)] SHS: Val# 1462; RNG: Val# 888 #521 AES ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB128 (e/d; 128, 192, 256); OFB (e/d; 128, 192, 256); CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-14) (Payload Length Range: 2-32)(Nonce Length(s): 13) (Tag Length(s): 4 6 8 10 12 14 16) #1670 #1671 SHS SHA-1 (BYTE-only); SHA-224 (BYTE-only); SHA-256 (BYTE-only); SHA-384 (BYTE-only); SHA-512 (BYTE-only) #1462 ZCM-100 Security Policy Rev. 1.2 © ZyFLEX Technologies Incorporation Page 11 Security Function Details CAVP Cert. # RNG ANSI X9.31 [ AES-128Key AES-192Key AES-256Key ] #888 #889 RSA FIPS 186-3: ALG[RSASSA-PKCS1_V1_5]; SIG(gen); SIG(ver): ( 1024 SHA(1, 224, 256, 384, 512)) (2048 SHA(1, 224, 256, 384, 512)) (3072 SHA(1,224,256,384,512)) SHS: SHA (Cert. #1462) #827 HMAC HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS (Cert. #1462) HMAC-SHA224 (Key Sizes Ranges Tested: KSBS ) SHS (Cert. #1462) HMAC-SHA256 (Key Sizes Ranges Tested: KSBS ) SHS (Cert. #1462) HMAC-SHA384 ( Key Size Ranges Tested: KS