cert_id |
3856 |
4570 |
dgst |
3f703336ec8defe4 |
9701e339c54549ed |
heuristics/algorithms |
DRBG#A7, AES#A10, DRBG#A9, AES#A7, SHS#A12, AES#A6, HMAC#A8, DRBG#A10, AES#A11, SHS#A8, AES#A8, RSA#A9, DRBG#A8, HMAC#A9, ECDSA#A8, SHS#A9, RSA#A8, CVL#A8, ECDSA#A9, HMAC#A12, Triple-DES#A8 |
DRBG#A7, AES#A10, DRBG#A9, AES#A7, SHS#A12, AES#A6, HMAC#A8, DRBG#A10, AES#A11, SHS#A8, AES#A8, RSA#A9, DRBG#A8, HMAC#A9, ECDSA#A8, SHS#A9, RSA#A8, ECDSA#A9, HMAC#A12, Triple-DES#A8 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES-128: 2
- AES-128/192/256: 1
- AES-256: 1
- AES256: 1
- HMAC- SHA-256: 1
- HMAC-SHA- 512: 2
- HMAC-SHA-1: 14
- HMAC-SHA-2: 8
- HMAC-SHA-224: 8
- HMAC-SHA-256: 12
- HMAC-SHA-384: 6
- HMAC-SHA-512: 6
- HMAC-SHA1: 4
- PKCS#1: 17
- RSA PKCS#1: 3
- SHA- 384: 1
- SHA-1: 2
- SHA-224: 3
- SHA-256: 5
- SHA-384: 1
- SHA-512: 4
- SHA1: 1
|
- Certlike:
- AES-128: 2
- AES-128/192/256: 1
- AES-256: 1
- HMAC- SHA-256: 1
- HMAC-SHA- 512: 2
- HMAC-SHA-1: 14
- HMAC-SHA-2: 8
- HMAC-SHA-224: 8
- HMAC-SHA-256: 12
- HMAC-SHA-384: 6
- HMAC-SHA-512: 6
- HMAC-SHA1: 4
- PKCS#1: 17
- RSA PKCS#1: 3
- SHA- 384: 1
- SHA-1: 2
- SHA-224: 3
- SHA-256: 5
- SHA-384: 1
- SHA-512: 4
- SHA1: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 15
- AES-128: 2
- AES-256: 1
- AES256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-224: 3
- HMAC-SHA-256: 5
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
- miscellaneous:
|
- AES_competition:
- AES:
- AES: 15
- AES-128: 2
- AES-256: 1
- CAST:
- RC:
- DES:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-224: 3
- HMAC-SHA-256: 5
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
- miscellaneous:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 4
- SHA-384: 2
- SHA-512: 5
|
- MD:
- PBKDF:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 4
- SHA-384: 2
- SHA-512: 5
|
pdf_data/keywords/crypto_scheme |
- KA:
- Key Agreement: 3
- Key agreement: 3
- MAC:
|
- KA:
- Key Agreement: 5
- Key agreement: 1
- MAC:
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
pdf_data/keywords/ecc_curve |
- Edwards:
- NIST:
- Curve P-192: 4
- P-192: 7
- P-224: 10
- P-256: 18
- P-384: 18
- P-521: 10
- curve P-192: 3
|
- Edwards:
- NIST:
- Curve P-192: 4
- P-192: 7
- P-224: 10
- P-256: 10
- P-384: 10
- P-521: 10
- curve P-192: 3
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 23
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS 198: 2
- FIPS PUB 140-2: 1
- FIPS186-4: 3
- NIST:
- SP 800-132: 3
- SP 800-133: 1
- SP 800-38: 5
- SP 800-38D: 1
- SP 800-56A: 2
- SP 800-56B: 2
- SP 800-57: 1
- SP 800-67: 1
- SP 800-90A: 6
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140-2: 24
- FIPS 180-4: 2
- FIPS 186-4: 3
- FIPS 197: 2
- FIPS 198: 2
- FIPS PUB 140-2: 1
- FIPS186-4: 2
- NIST:
- SP 800-132: 3
- SP 800-133: 1
- SP 800-38: 5
- SP 800-38D: 1
- SP 800-56B: 2
- SP 800-57: 1
- SP 800-67: 1
- SP 800-90A: 6
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /CreationDate: D:20210317181437Z00'00'
- /Creator: Word
- /ModDate: D:20210317181437Z00'00'
- /Producer: macOS Version 11.2.3 (Build 20D91) Quartz PDFContext
- /Title: Microsoft Word - Apple_Inc_Security_Policy_CC10_for_ARM_user_space_v1.4.docx
- pdf_file_size_bytes: 3370558
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /CreationDate: D:20230703172845Z00'00'
- /Creator: Word
- /ModDate: D:20230703172845Z00'00'
- /Producer: macOS Version 11.5.1 (Build 20G80) Quartz PDFContext
- /Title: Microsoft Word - Apple_Inc_Security_Policy_CC10_for_ARM_user_space_v1.6.docx
- pdf_file_size_bytes: 3637072
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS Mode |
When operated in FIPS Mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/March 2021_010421_0724_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2023_010923_0844.pdf |
web_data/date_sunset |
|
22.03.2026 |
web_data/description |
The Apple corecrypto User Space Module for ARM (ccv10) is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest. |
The Apple corecrypto User Space Module for ARM (ccv10) is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4570 |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Apple corecrypto User Space Module for ARM (ccv10) |
Apple corecrypto User Space Module for ARM (ccv10) |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
10.0 |
10.0 |
web_data/tested_conf |
iOS 13 running on iPhone 11 Pro Max with Apple A13 Bionic with PAA, iOS 13 running on iPhone 11 Pro Max with Apple A13 Bionic without PAA, iOS 13 running on iPhone 6S Plus with Apple A9 with PAA, iOS 13 running on iPhone 6S Plus with Apple A9 without PAA, iOS 13 running on iPhone 7 Plus with Apple A10 Fusion with PAA, iOS 13 running on iPhone 7 Plus with Apple A10 Fusion without PAA, iOS 13 running on iPhone 8 Plus with Apple A11 Bionic with PAA, iOS 13 running on iPhone 8 Plus with Apple A11 Bionic without PAA, iOS 13 running on iPhone Xs Max with Apple A12 Bionic with PAA, iOS 13 running on iPhone Xs Max with Apple A12 Bionic without PAA, iPadOS 13 running on iPad (5th generation) with Apple A9 with PAA, iPadOS 13 running on iPad (5th generation) with Apple A9 without PAA, iPadOS 13 running on iPad (6th generation) with Apple A10 Fusion with PAA, iPadOS 13 running on iPad (6th generation) with Apple A10 Fusion without PAA, iPadOS 13 running on iPad Air 2 with Apple A8X with PAA, iPadOS 13 running on iPad Air 2 with Apple A8X without PAA, iPadOS 13 running on iPad mini (5th generation) with Apple A12 Bionic with PAA, iPadOS 13 running on iPad mini (5th generation) with Apple A12 Bionic without PAA, iPadOS 13 running on iPad mini 4 with Apple A8 with PAA, iPadOS 13 running on iPad mini 4 with Apple A8 without PAA, iPadOS 13 running on iPad Pro (12.9 inch, 2nd generation) with Apple A10X Fusion with PAA, iPadOS 13 running on iPad Pro (12.9 inch, 2nd generation) with Apple A10X Fusion without PAA, iPadOS 13 running on iPad Pro (12.9 inch, 3rd generation) with Apple A12X Bionic with PAA, iPadOS 13 running on iPad Pro (12.9 inch, 3rd generation) with Apple A12X Bionic without PAA, iPadOS 13 running on iPad Pro (9.7 inch) with Apple A9X with PAA, iPadOS 13 running on iPad Pro (9.7 inch) with Apple A9X without PAA, tvOS 13 running on Apple TV 4K with Apple A10X Fusion with PAA, tvOS 13 running on Apple TV 4K with Apple A10X Fusion without PAA, TxFW 10.15 running on Apple T2 with PAA, TxFW 10.15 running on Apple T2 without PAA (single-user mode), watchOS 6 running on Apple Watch Series 1 with Apple S1P with PAA, watchOS 6 running on Apple Watch Series 1 with Apple S1P without PAA, watchOS 6 running on Apple Watch Series 3 with Apple S3 with PAA, watchOS 6 running on Apple Watch Series 3 with Apple S3 without PAA, watchOS 6 running on Apple Watch Series 4 with Apple S4 with PAA, watchOS 6 running on Apple Watch Series 4 with Apple S4 without PAA, watchOS 6 running on Apple Watch Series 5 with Apple S5 with PAA, watchOS 6 running on Apple Watch Series 5 with Apple S5 without PAA |
iOS 13 running on iPhone 11 Pro Max with Apple A13 Bionic with PAA, iOS 13 running on iPhone 11 Pro Max with Apple A13 Bionic without PAA, iOS 13 running on iPhone 6S Plus with Apple A9 with PAA, iOS 13 running on iPhone 6S Plus with Apple A9 without PAA, iOS 13 running on iPhone 7 Plus with Apple A10 Fusion with PAA, iOS 13 running on iPhone 7 Plus with Apple A10 Fusion without PAA, iOS 13 running on iPhone 8 Plus with Apple A11 Bionic with PAA, iOS 13 running on iPhone 8 Plus with Apple A11 Bionic without PAA, iOS 13 running on iPhone Xs Max with Apple A12 Bionic with PAA, iOS 13 running on iPhone Xs Max with Apple A12 Bionic without PAA, iPadOS 13 running on iPad (5th generation) with Apple A9 with PAA, iPadOS 13 running on iPad (5th generation) with Apple A9 without PAA, iPadOS 13 running on iPad (6th generation) with Apple A10 Fusion with PAA, iPadOS 13 running on iPad (6th generation) with Apple A10 Fusion without PAA, iPadOS 13 running on iPad Air 2 with Apple A8X with PAA, iPadOS 13 running on iPad Air 2 with Apple A8X without PAA, iPadOS 13 running on iPad mini (5th generation) with Apple A12 Bionic with PAA, iPadOS 13 running on iPad mini (5th generation) with Apple A12 Bionic without PAA, iPadOS 13 running on iPad mini 4 with Apple A8 with PAA, iPadOS 13 running on iPad mini 4 with Apple A8 without PAA, iPadOS 13 running on iPad Pro (12.9 inch, 2nd generation) with Apple A10X Fusion with PAA, iPadOS 13 running on iPad Pro (12.9 inch, 2nd generation) with Apple A10X Fusion without PAA, iPadOS 13 running on iPad Pro (12.9 inch, 3rd generation) with Apple A12X Bionic with PAA, iPadOS 13 running on iPad Pro (12.9 inch, 3rd generation) with Apple A12X Bionic without PAA, iPadOS 13 running on iPad Pro (9.7 inch) with Apple A9X with PAA, iPadOS 13 running on iPad Pro (9.7 inch) with Apple A9X without PAA, tvOS 13 running on Apple TV 4K with Apple A10X Fusion with PAA, tvOS 13 running on Apple TV 4K with Apple A10X Fusion without PAA, TxFW 10.15 running on Apple T2 with PAA, TxFW 10.15 running on Apple T2 without PAA (single-user mode), watchOS 6 running on Apple Watch Series 1 with Apple S1P with PAA, watchOS 6 running on Apple Watch Series 1 with Apple S1P without PAA, watchOS 6 running on Apple Watch Series 3 with Apple S3 with PAA, watchOS 6 running on Apple Watch Series 3 with Apple S3 without PAA, watchOS 6 running on Apple Watch Series 4 with Apple S4 with PAA, watchOS 6 running on Apple Watch Series 4 with Apple S4 without PAA, watchOS 6 running on Apple Watch Series 5 with Apple S5 with PAA, watchOS 6 running on Apple Watch Series 5 with Apple S5 without PAA |
web_data/validation_history |
- date: 23.03.2021
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 30.08.2023
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Apple Inc. |
Apple Inc. |
web_data/vendor_url |
http://www.apple.com |
http://www.apple.com |