Apple corecrypto Kernel Space Module for Intel (ccv10)

Certificate #3858

Webpage information

Status active
Validation dates 24.03.2021
Sunset date 23-03-2026
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Physical Security: N/A
Description The Apple corecrypto Kernel Space Module for Intel (ccv10) is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.
Tested configurations
  • macOS Catalina 10.15 running on iMac Pro with Intel Xeon W with PAA
  • macOS Catalina 10.15 running on iMac Pro with Intel Xeon W without PAA
  • macOS Catalina 10.15 running on Mac mini with Intel Core i5 with PAA
  • macOS Catalina 10.15 running on Mac mini with Intel Core i5 without PAA
  • macOS Catalina 10.15 running on MacBook Pro with Intel Core i7 with PAA
  • macOS Catalina 10.15 running on MacBook Pro with Intel Core i7 without PAA
  • macOS Catalina 10.15 running on MacBook Pro with Intel Core i9 with PAA
  • macOS Catalina 10.15 running on MacBook Pro with Intel Core i9 without PAA
  • macOS Catalina 10.15 running on MacBook with Intel Core M with PAA
  • macOS Catalina 10.15 running on MacBook with Intel Core M without PAA (single-user mode)
Vendor Apple Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-256, CAST5, RC2, RC4, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-224, HMAC-SHA-256
Asymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DSA
Hash functions
SHA-1, SHA-384, SHA-512, SHA-224, SHA-256, MD4, MD5, RIPEMD, PBKDF
Schemes
MAC, Key Agreement, Key agreement
Protocols
TLS
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256, P-384, P-521, curve P-192, P-192, Ed25519
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
level 1, Level 2

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS186-4, FIPS 198, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, SP 800-38D, PKCS#1, RFC6637, RFC 5288

File metadata

Title Microsoft Word - Apple_Inc_Security_Policy_CC10_for_Intel_kernel_space_v1.3.doc
Creation date D:20210318230448Z00'00'
Modification date D:20210318230448Z00'00'
Pages 27
Creator Word
Producer macOS Version 11.2.3 (Build 20D91) Quartz PDFContext

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3858,
  "dgst": "ce7c2e96341731fc",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "ECDSA#A34",
        "SHS#A34",
        "AES#A15",
        "SHS#A32",
        "ECDSA#A26",
        "DRBG#A28",
        "RSA#A26",
        "AES#A20",
        "HMAC#A26",
        "DRBG#A23",
        "DRBG#A13",
        "HMAC#A30",
        "DRBG#A34",
        "DRBG#A26",
        "KTS#A28",
        "HMAC#A34",
        "SHS#A30",
        "DRBG#A15",
        "AES#A24",
        "RSA#A34",
        "Triple-DES#A16",
        "KTS#A13",
        "AES#A23",
        "SHS#A26",
        "KTS#A15",
        "DRBG#A30",
        "RSA#A30",
        "AES#A13",
        "ECDSA#A30",
        "HMAC#A32",
        "KTS#A23",
        "AES#A28"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 4
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 7
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 6
        },
        "OFB": {
          "OFB": 1
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 3
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 2
        },
        "NIST": {
          "P-192": 12,
          "P-224": 12,
          "P-256": 12,
          "P-384": 10,
          "P-521": 12,
          "curve P-192": 4
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 2
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES-128": 2,
          "AES-128/192/256": 2,
          "AES-256": 2,
          "HMAC-SHA- 256": 2,
          "HMAC-SHA- 512": 2,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-224": 6,
          "HMAC-SHA-256": 8,
          "HMAC-SHA-384": 4,
          "HMAC-SHA-512": 4,
          "HMAC-SHA1": 4,
          "PKCS#1": 17,
          "RSA PKCS#1": 1,
          "SHA- 512": 1,
          "SHA-1": 4,
          "SHA-224": 5,
          "SHA-256": 4,
          "SHA-384": 3,
          "SHA-512": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 1
          }
        },
        "PBKDF": {
          "PBKDF": 6
        },
        "RIPEMD": {
          "RIPEMD": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 2,
            "SHA-384": 5,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 17
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 23,
          "FIPS 180-4": 2,
          "FIPS 186-4": 2,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS PUB 140-2": 1,
          "FIPS186-4": 3
        },
        "NIST": {
          "SP 800-132": 1,
          "SP 800-38": 5,
          "SP 800-38D": 1,
          "SP 800-67": 1,
          "SP 800-90": 1,
          "SP 800-90A": 5
        },
        "PKCS": {
          "PKCS#1": 9
        },
        "RFC": {
          "RFC 5288": 1,
          "RFC6637": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15,
            "AES-128": 2,
            "AES-256": 2
          },
          "CAST": {
            "CAST5": 2
          },
          "RC": {
            "RC2": 2,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 12
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 10,
            "HMAC-SHA-224": 2,
            "HMAC-SHA-256": 3,
            "HMAC-SHA-384": 3,
            "HMAC-SHA-512": 3
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20210318230448Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210318230448Z00\u002700\u0027",
      "/Producer": "macOS Version 11.2.3 (Build 20D91) Quartz PDFContext",
      "/Title": "Microsoft Word - Apple_Inc_Security_Policy_CC10_for_Intel_kernel_space_v1.3.doc",
      "pdf_file_size_bytes": 2623932,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 27
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "2b8bcf6dcc83aded4d9c72b80396fbb4eff54aeef47d897414685cc6c24baf78",
    "policy_txt_hash": "cafa07ccf3f2ec740feb10dfa91d38bef8a0f3bc279549dbdd6485f717637d2c"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf",
    "date_sunset": "2026-03-23",
    "description": "The Apple corecrypto Kernel Space Module for Intel (ccv10) is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Apple corecrypto Kernel Space Module for Intel (ccv10)",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": "10.0",
    "tested_conf": [
      "macOS Catalina 10.15 running on iMac Pro with Intel Xeon W with PAA",
      "macOS Catalina 10.15 running on iMac Pro with Intel Xeon W without PAA",
      "macOS Catalina 10.15 running on Mac mini with Intel Core i5 with PAA",
      "macOS Catalina 10.15 running on Mac mini with Intel Core i5 without PAA",
      "macOS Catalina 10.15 running on MacBook Pro with Intel Core i7 with PAA",
      "macOS Catalina 10.15 running on MacBook Pro with Intel Core i7 without PAA",
      "macOS Catalina 10.15 running on MacBook Pro with Intel Core i9 with PAA",
      "macOS Catalina 10.15 running on MacBook Pro with Intel Core i9 without PAA",
      "macOS Catalina 10.15 running on MacBook with Intel Core M with PAA",
      "macOS Catalina 10.15 running on MacBook with Intel Core M without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-03-24",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Apple Inc.",
    "vendor_url": "http://www.apple.com"
  }
}