This page was not yet optimized for use on mobile
devices.
Apple CoreCrypto Kernel Module v8.0 for Intel
Certificate #3156
Webpage information
Security policy
Symmetric Algorithms
AES, AES-128, CAST5, RC2, RC4, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256Asymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DSAHash functions
SHA-1, SHA-384, SHA-512, SHA-224, SHA-2, MD4, MD5, RIPEMD, PBKDFSchemes
MAC, Key Agreement, Key agreementProtocols
TLSRandomness
TRNG, DRBG, RNGElliptic Curves
P-256, P-384, P-521, P-224, P-192, curve P-384, Ed25519Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTSSecurity level
level 1, Level 2Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS186-4, FIPS 198, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, NIST SP 800-90A, PKCS #1, PKCS#1, RFC6637, RFC 6637File metadata
| Title | Microsoft Word - TID-11-1514-Apple-Inc--140sp_CC8_4.1.doc |
|---|---|
| Creation date | D:20180312195111Z00'00' |
| Modification date | D:20180312195111Z00'00' |
| Pages | 29 |
| Creator | Word |
| Producer | Mac OS X 10.12.6 Quartz PDFContext |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3156,
"dgst": "e902f49872400fbf",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DRBG#1816",
"SHS#4053",
"KTS#5055",
"AES#4988",
"DRBG#1873",
"AES#4996",
"AES#4994",
"DRBG#1811",
"RSA#2740",
"SHS#4055",
"HMAC#3312",
"SHS#4054",
"HMAC#3308",
"SHS#4058",
"RSA#2748",
"SHS#4059",
"KTS#4989",
"ECDSA#1308",
"KTS#5065",
"KTS#4990",
"DRBG#1806",
"DRBG#1814",
"HMAC#3375",
"HMAC#3377",
"HMAC#3318",
"KTS#5063",
"KTS#4988",
"KTS#5071",
"AES#4995",
"DRBG#1812",
"ECDSA#1309",
"DRBG#1805",
"DRBG#1810",
"SHS#4052",
"KTS#5072",
"DRBG#1819",
"HMAC#3317",
"SHS#4056",
"AES#5072",
"DRBG#1876",
"AES#4985",
"AES#5055",
"SHS#4060",
"DRBG#1872",
"AES#5065",
"RSA#2741",
"ECDSA#1313",
"DRBG#1807",
"SHS#4127",
"Triple-DES#2615",
"DRBG#1883",
"KTS#5057",
"DRBG#1878",
"KTS#4992",
"DRBG#1877",
"Triple-DES#2613",
"DRBG#1889",
"DRBG#1888",
"DRBG#1808",
"ECDSA#1310",
"HMAC#3315",
"HMAC#3382",
"HMAC#3319",
"HMAC#3314",
"KTS#5054",
"RSA#2742",
"SHS#4057",
"KTS#4996",
"HMAC#3313",
"AES#4987",
"HMAC#3311",
"KTS#4987",
"KTS#4994",
"DRBG#1882",
"SHS#4061",
"AES#5054",
"SHS#4062",
"KTS#4991",
"SHS#4121",
"DRBG#1809",
"HMAC#3316",
"Triple-DES#2614",
"DRBG#1874",
"DRBG#1815",
"SHS#4120",
"AES#5056",
"DRBG#1804",
"DRBG#1875",
"AES#4990",
"DRBG#1818",
"HMAC#3376",
"AES#4992",
"AES#5071",
"AES#4991",
"DRBG#1885",
"KTS#4985",
"AES#4993",
"DRBG#1817",
"AES#4989",
"Triple-DES#2618",
"KTS#5056",
"AES#5057",
"AES#4986",
"KTS#4986",
"SHS#4122",
"AES#5063",
"KTS#4993",
"DRBG#1813",
"SHS#4051",
"KTS#4995"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"8.0"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDSA": {
"ECDSA": 13
}
},
"FF": {
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA-OAEP": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CCM": {
"CCM": 3
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 7
},
"ECB": {
"ECB": 8
},
"GCM": {
"GCM": 3
},
"OFB": {
"OFB": 2
},
"XTS": {
"XTS": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"Edwards": {
"Ed25519": 2
},
"NIST": {
"P-192": 14,
"P-224": 4,
"P-256": 4,
"P-384": 9,
"P-521": 10,
"curve P-384": 1
}
},
"eval_facility": {
"atsec": {
"atsec": 2
}
},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"AES-128": 2,
"HMAC- SHA-512": 1,
"HMAC-SHA-1": 14,
"HMAC-SHA-224": 12,
"HMAC-SHA-256": 4,
"HMAC-SHA-256 1808": 2,
"HMAC-SHA-256 1811": 2,
"HMAC-SHA-256 1815": 2,
"HMAC-SHA-256 3308": 2,
"HMAC-SHA-256 3311": 2,
"HMAC-SHA-256 3315": 2,
"HMAC-SHA-384": 4,
"PKCS #1": 1,
"PKCS#1": 12,
"RSA PKCS #1": 1,
"SHA- 256": 1,
"SHA-1": 5,
"SHA-2": 1,
"SHA-224": 4,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 2
}
},
"fips_security_level": {
"Level": {
"Level 2": 1,
"level 1": 3
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 2
},
"MD5": {
"MD5": 2
}
},
"PBKDF": {
"PBKDF": 3
},
"RIPEMD": {
"RIPEMD": 2
},
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 1,
"SHA-384": 5,
"SHA-512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 11
},
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 23,
"FIPS 180-4": 2,
"FIPS 186-4": 3,
"FIPS 197": 2,
"FIPS 198": 1,
"FIPS PUB 140-2": 1,
"FIPS186-4": 2
},
"NIST": {
"NIST SP 800-90A": 1,
"SP 800-132": 1,
"SP 800-38": 4,
"SP 800-67": 1,
"SP 800-90": 1,
"SP 800-90A": 4
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 6
},
"RFC": {
"RFC 6637": 1,
"RFC6637": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-128": 2
},
"CAST": {
"CAST5": 2
},
"RC": {
"RC2": 2,
"RC4": 2
}
},
"DES": {
"3DES": {
"Triple-DES": 10
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 8,
"HMAC-SHA-256": 2,
"HMAC-SHA-384": 8,
"HMAC-SHA-512": 6
}
},
"miscellaneous": {
"Blowfish": {
"Blowfish": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/AAPL:Keywords": "[]",
"/CreationDate": "D:20180312195111Z00\u002700\u0027",
"/Creator": "Word",
"/Keywords": "",
"/ModDate": "D:20180312195111Z00\u002700\u0027",
"/Producer": "Mac OS X 10.12.6 Quartz PDFContext",
"/Title": "Microsoft Word - TID-11-1514-Apple-Inc--140sp_CC8_4.1.doc",
"pdf_file_size_bytes": 368186,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "5528481b784e15be57c0e02065226f00a2dfed39a86ace551928d6db4ba1b1c6",
"policy_txt_hash": "3c51bc0bdd9404968a46adf1088c403716d98384fe199eeee51662841cc9bb53"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf",
"date_sunset": null,
"description": "The Apple CoreCrypto Kerenl Module v8.0 for Intel is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Physical Security: N/A"
],
"fw_versions": null,
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Apple CoreCrypto Kernel Module v8.0 for Intel",
"module_type": "Software",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": "8.0",
"tested_conf": [
"macOS High Sierra 10.13 running on iMac Pro with Xeon CPU with PAA",
"macOS High Sierra 10.13 running on iMac Pro with Xeon CPU without PAA",
"macOS High Sierra 10.13 running on Mac mini with i5 CPU with PAA",
"macOS High Sierra 10.13 running on Mac mini with i5 CPU without PAA",
"macOS High Sierra 10.13 running on MacBook Pro with i7 CPU with PAA",
"macOS High Sierra 10.13 running on MacBook Pro with i7 CPU without PAA",
"macOS High Sierra 10.13 running on MacBook with Core M CPU with PAA",
"macOS High Sierra 10.13 running on MacBook with Core M CPU without PAA (single-user mode)"
],
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2018-03-22",
"lab": "atsec information security corporation",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-03-11",
"lab": "atsec information security corporation",
"validation_type": "Update"
}
],
"vendor": "Apple Inc.",
"vendor_url": "http://www.apple.com"
}
}