Apple macOS CoreCrypto Kernel Module, v7.0

Certificate #2830

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 01.02.2017 , 11.03.2021
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
Description The Apple macOS CoreCrypto Kernel Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
Tested configurations
  • macOS Sierra 10.12.2 running on Mac mini with i5 CPU with PAA
  • macOS Sierra 10.12.2 running on Mac mini with i5 CPU without PAA
  • macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU with PAA
  • macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU without PAA
  • macOS Sierra 10.12.2 running on MacBook with Core M CPU with PAA
  • macOS Sierra 10.12.2 running on MacBook with Core M CPU without PAA (single-user mode)
  • macOS Sierra 10.12.2 running on MacPro with Xeon CPU with PAA
  • macOS Sierra 10.12.2 running on MacPro with Xeon CPU without PAA
Vendor Apple Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, CAST5, RC2, RC4, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-512, SHA-384, SHA-2, MD4, MD5, RIPEMD, PBKDF
Schemes
MAC, Key Agreement, Key agreement
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-256, P-384, P-224, P-521, P-192, curve P-384, Ed25519
Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCM, XTS

Security level
level 1, Level 2

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS186-4, FIPS 198, FIPS186-2, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, NIST SP 800-90A, PKCS #1, PKCS#1, RFC6637, RFC 6637

File metadata

Title FIPS 140-2 Non-Proprietary Security Policy
Keywords FIPS 140-2, FSM
Author Renaudt Nunez
Creation date D:20170127173331-06'00'
Modification date D:20170127173337-06'00'
Pages 30
Creator Acrobat PDFMaker 11 for Word
Producer Adobe PDF Library 11.0

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2830,
  "dgst": "c6637ffab46701f1",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#2313",
        "RSA#2312",
        "AES#4206",
        "Triple-DES#2310",
        "AES#4290",
        "KTS#4263",
        "SHS#3505",
        "ECDSA#1000",
        "SHS#3508",
        "SHS#3503",
        "HMAC#2792",
        "HMAC#2807",
        "SHS#3495",
        "KTS#4201",
        "AES#4201",
        "SHS#3507",
        "AES#4202",
        "DRBG#1290",
        "AES#4205",
        "KTS#4199",
        "KTS#4200",
        "DRBG#1351",
        "DRBG#1287",
        "SHS#3496",
        "DRBG#1350",
        "KTS#4203",
        "SHS#3529",
        "HMAC#2803",
        "HMAC#2805",
        "AES#4203",
        "HMAC#2828",
        "AES#4291",
        "HMAC#2826",
        "AES#4264",
        "AES#4200",
        "HMAC#2808",
        "SHS#3527",
        "RSA#2313",
        "DRBG#1334",
        "AES#4261",
        "HMAC#2827",
        "KTS#4289",
        "DRBG#1335",
        "SHS#3528",
        "KTS#4264",
        "KTS#4292",
        "SHS#3493",
        "KTS#4290",
        "Triple-DES#2311",
        "ECDSA#999",
        "HMAC#2795",
        "AES#4262",
        "AES#4263",
        "HMAC#2804",
        "HMAC#2793",
        "DRBG#1332",
        "HMAC#2825",
        "HMAC#2794",
        "Triple-DES#2312",
        "DRBG#1352",
        "RSA#2311",
        "AES#4289",
        "DRBG#1349",
        "KTS#4291",
        "DRBG#1288",
        "ECDSA#1002",
        "RSA#2310",
        "AES#4204",
        "DRBG#1333",
        "SHS#3504",
        "SHS#3509",
        "DRBG#1289",
        "AES#4292",
        "AES#4199",
        "SHS#3494",
        "HMAC#2802",
        "KTS#4262",
        "ECDSA#1001",
        "SHS#3530",
        "KTS#4261",
        "SHS#3506",
        "HMAC#2806"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "7.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 14
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 8
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 4
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 2
        },
        "NIST": {
          "P-192": 16,
          "P-224": 12,
          "P-256": 8,
          "P-384": 9,
          "P-521": 16,
          "curve P-384": 1
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 2
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-128": 2,
          "HMAC- SHA-512": 1,
          "HMAC-SHA-1": 2,
          "HMAC-SHA-256": 4,
          "PKCS #1": 1,
          "PKCS#1": 6,
          "RSA PKCS #1": 1,
          "RSA PKCS1-v1_5": 1,
          "SHA- 256": 1,
          "SHA- 384": 4,
          "SHA-1": 11,
          "SHA-2": 1,
          "SHA-2 (224": 4,
          "SHA-2(224": 1,
          "SHA-224": 5,
          "SHA-256": 4,
          "SHA-384": 1,
          "SHA-512": 2,
          "SHA-512 2802": 1,
          "SHA-512 2805": 1,
          "SHA-512 3503": 1,
          "SHA-512 3506": 1,
          "SHA1": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 2
          }
        },
        "PBKDF": {
          "PBKDF": 3
        },
        "RIPEMD": {
          "RIPEMD": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 11,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-2": 6,
            "SHA-224": 5,
            "SHA-256": 4,
            "SHA-384": 1,
            "SHA-512": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 22,
          "FIPS 180-4": 2,
          "FIPS 186-4": 2,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS PUB 140-2": 1,
          "FIPS186-2": 1,
          "FIPS186-4": 1
        },
        "NIST": {
          "NIST SP 800-90A": 1,
          "SP 800-132": 1,
          "SP 800-38": 4,
          "SP 800-67": 1,
          "SP 800-90": 1,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 6637": 1,
          "RFC6637": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15,
            "AES-128": 2
          },
          "CAST": {
            "CAST5": 2
          },
          "RC": {
            "RC2": 2,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 11
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8,
            "HMAC-SHA-256": 2
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Renaudt Nunez",
      "/Company": "",
      "/CreationDate": "D:20170127173331-06\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 for Word",
      "/Keywords": "FIPS 140-2, FSM",
      "/ModDate": "D:20170127173337-06\u002700\u0027",
      "/Name": "Apple macOS CoreCrypto Kernel Module, v7.0",
      "/Producer": "Adobe PDF Library 11.0",
      "/SourceModified": "D:20170127233320",
      "/Subject": "",
      "/Title": "FIPS 140-2 Non-Proprietary Security Policy",
      "/Version": "3.1",
      "pdf_file_size_bytes": 293642,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/standards.html",
          "http://csrc.nist.gov/groups/STM/cavp/index.html",
          "http://www.apple.com/",
          "http://csrc.nist.gov/groups/STM/cmvp/index.html",
          "https://developer.apple.com/library/mac/#documentation/MacOSX/Conceptual/OSX_Technology_Overview/About/About.html",
          "https://support.apple.com/en-us/HT201159",
          "https://developer.apple.com/library/mac/navigation/#section=Topics\u0026topic=Security"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "24abd0833c769f78493a92f37195a5563b4f770befb5c47dfc2a7610700dc6c4",
    "policy_txt_hash": "f49dd1646b4eb179b0f2b576e8e7d425076a8b7435a11638cf1c731270a66bbf"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertFeb2017.pdf",
    "date_sunset": null,
    "description": "The Apple macOS CoreCrypto Kernel Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Apple macOS CoreCrypto Kernel Module, v7.0",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "7.0",
    "tested_conf": [
      "macOS Sierra 10.12.2 running on Mac mini with i5 CPU with PAA",
      "macOS Sierra 10.12.2 running on Mac mini with i5 CPU without PAA",
      "macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU with PAA",
      "macOS Sierra 10.12.2 running on MacBook Pro with i7 CPU without PAA",
      "macOS Sierra 10.12.2 running on MacBook with Core M CPU with PAA",
      "macOS Sierra 10.12.2 running on MacBook with Core M CPU without PAA (single-user mode)",
      "macOS Sierra 10.12.2 running on MacPro with Xeon CPU with PAA",
      "macOS Sierra 10.12.2 running on MacPro with Xeon CPU without PAA"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-02-01",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-03-11",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "Apple Inc.",
    "vendor_url": "http://www.apple.com"
  }
}