Microchip Trust Anchor TA100

Certificate #4421

Webpage information ?

Status active
Validation dates 20.01.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Single Chip
Caveat The module generates cryptographic keys whose strengths are modified by available entropy. When installed, initialized and configured as specified in Section 5 of the Security Policy
Exceptions
  • Physical Security: Level 3
  • Mitigation of Other Attacks: N/A
Description The Microchip Trust Anchor TA100 is a secure element from the Microchip CryptoAutomotive™ portfolio intended for automotive security applications providing support for code authentication (aka secure boot), message authentication via MAC generation, support for trusted firmware updates, multiple key management protocols including TLS and other root-of-trust based operations. It is typically a companion device to an MCU or MPU on the same board.
Version (Hardware) [TA100-Y230C2X01 and TA100T-Y230C2X01, Revision 59V01B5] [1] and [TA100-Y240C2X01, TA100T-Y240C2X01, TA100-Y240D3X01 and TA100-Y240UFB01, Revision 59V01B6] [2]
Version (Firmware) [CP ROM Version 0x0006, ACE ROM Version 0x04 and DevUpdate Version 0x00B50002] [1] and [CP ROM Version 0x0007, ACE ROM Version 0x04, DevUpdate Version 0x00B60001] [2]
Vendor Microchip Technology Inc
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES128, AES-128, HMAC, HMAC-SHA-256, CMAC
Asymmetric Algorithms
RSA 2048, RSA2048, RSA3072, ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-256, SHA256, MD5
Schemes
MAC, Key Agreement
Protocols
SSH, TLS, TLS 1.3, TLS 1.2
Randomness
DRBG, RNG
Block cipher modes
ECB, CTR, GCM

Security level
Level 3

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 197, FIPS 180-4, FIPS 186-1, FIPS 186-4, FIPS 198, FIPS186-2, FIPS186-3, SP 800-90B, NIST SP 800-56A, PKCS#1, PKCS #1, RFC 3447, X.509

File metadata

Title Aegisolve, Inc
Author Travis Spann
Creation date D:20220909133846-04'00'
Modification date D:20220909133846-04'00'
Pages 33
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 09.02.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4421,
  "dgst": "dcda112812f66db6",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHS#A856",
        "KBKDF#A858",
        "SHS#A854",
        "AES#A2515",
        "DRBG#A850",
        "KAS#A1022",
        "AES#A855",
        "KAS#A1021",
        "AES#A852",
        "HMAC#A853",
        "AES#A874",
        "CVL#A857",
        "AES#A851",
        "HMAC#A859",
        "RSA#A875",
        "KAS#A1023",
        "ECDSA#A860"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2",
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 12
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 2048": 2,
          "RSA2048": 2,
          "RSA3072": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CTR": {
          "CTR": 25
        },
        "ECB": {
          "ECB": 7
        },
        "GCM": {
          "GCM": 54
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 6,
            "TLS 1.2": 6,
            "TLS 1.3": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128": 1,
          "AES-128": 7,
          "AES128": 1,
          "HMAC SHA256": 9,
          "HMAC-SHA-256": 6,
          "HMAC-SHA256": 2,
          "PKCS #1": 2,
          "PKCS#1": 3,
          "RSA 2048": 2,
          "RSA PKCS#1": 1,
          "RSA2": 1,
          "RSA2048": 2,
          "RSA3072": 1,
          "SHA-256": 5,
          "SHA2-256": 7,
          "SHA256": 12
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 5,
            "SHA256": 12
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 21
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 36,
          "FIPS 180-4": 2,
          "FIPS 186-1": 2,
          "FIPS 186-4": 10,
          "FIPS 197": 4,
          "FIPS 198": 1,
          "FIPS PUB 140-2": 1,
          "FIPS186-2": 1,
          "FIPS186-3": 1
        },
        "NIST": {
          "NIST SP 800-56A": 2,
          "SP 800-90B": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 3447": 1
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15,
            "AES-128": 7,
            "AES128": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7,
            "HMAC": 17,
            "HMAC-SHA-256": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Travis Spann",
      "/CreationDate": "D:20220909133846-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220909133846-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "/Title": "Aegisolve, Inc",
      "pdf_file_size_bytes": 720386,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "c994cc5d3a8ac68dcc54108f9542bf3ec9db4bceb6cbbc96cdf6cb9160a358e2",
    "policy_txt_hash": "6e064409fb80a5cec0eefc1ff8ca0cbda511800c9b1bf6ce5b3f1c80615c34ef"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "The module generates cryptographic keys whose strengths are modified by available entropy. When installed, initialized and configured as specified in Section 5 of the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/January 2023_010223_0657_signed.pdf",
    "date_sunset": "2026-09-21",
    "description": "The Microchip Trust Anchor TA100 is a secure element from the Microchip CryptoAutomotive\u2122 portfolio intended for automotive security applications providing support for code authentication (aka secure boot), message authentication via MAC generation, support for trusted firmware updates, multiple key management protocols including TLS and other root-of-trust based operations. It is typically a companion device to an MCU or MPU on the same board.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Physical Security: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "[CP ROM Version 0x0006, ACE ROM Version 0x04 and DevUpdate Version 0x00B50002] [1] and [CP ROM Version 0x0007, ACE ROM Version 0x04, DevUpdate Version 0x00B60001] [2]",
    "historical_reason": null,
    "hw_versions": "[TA100-Y230C2X01 and TA100T-Y230C2X01, Revision 59V01B5] [1] and [TA100-Y240C2X01, TA100T-Y240C2X01, TA100-Y240D3X01 and TA100-Y240UFB01, Revision 59V01B6] [2]",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Microchip Trust Anchor TA100",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-01-20",
        "lab": "\u00c6GISOLVE",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Microchip Technology Inc",
    "vendor_url": "http://www.microchip.com"
  }
}