Apple CoreCrypto Kernel Module v8.0 for Intel

Certificate #3156

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 22.03.2018 , 11.03.2021
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Physical Security: N/A
Description The Apple CoreCrypto Kerenl Module v8.0 for Intel is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.
Tested configurations
  • macOS High Sierra 10.13 running on iMac Pro with Xeon CPU with PAA
  • macOS High Sierra 10.13 running on iMac Pro with Xeon CPU without PAA
  • macOS High Sierra 10.13 running on Mac mini with i5 CPU with PAA
  • macOS High Sierra 10.13 running on Mac mini with i5 CPU without PAA
  • macOS High Sierra 10.13 running on MacBook Pro with i7 CPU with PAA
  • macOS High Sierra 10.13 running on MacBook Pro with i7 CPU without PAA
  • macOS High Sierra 10.13 running on MacBook with Core M CPU with PAA
  • macOS High Sierra 10.13 running on MacBook with Core M CPU without PAA (single-user mode)
Vendor Apple Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, CAST5, RC2, RC4, DES, Triple-DES, Blowfish, HMAC, HMAC-SHA-384, HMAC-SHA-512, HMAC-SHA-256
Asymmetric Algorithms
RSA-OAEP, ECDSA, ECC, DSA
Hash functions
SHA-1, SHA-384, SHA-512, SHA-224, SHA-2, MD4, MD5, RIPEMD, PBKDF
Schemes
MAC, Key Agreement, Key agreement
Protocols
TLS
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-256, P-384, P-521, P-224, P-192, curve P-384, Ed25519
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

Security level
level 1, Level 2

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS186-4, FIPS 198, SP 800-90A, SP 800-90, SP 800-38, SP 800-67, SP 800-132, NIST SP 800-90A, PKCS #1, PKCS#1, RFC6637, RFC 6637

File metadata

Title Microsoft Word - TID-11-1514-Apple-Inc--140sp_CC8_4.1.doc
Creation date D:20180312195111Z00'00'
Modification date D:20180312195111Z00'00'
Pages 29
Creator Word
Producer Mac OS X 10.12.6 Quartz PDFContext

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3156,
  "dgst": "e902f49872400fbf",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DRBG#1816",
        "SHS#4053",
        "KTS#5055",
        "AES#4988",
        "DRBG#1873",
        "AES#4996",
        "AES#4994",
        "DRBG#1811",
        "RSA#2740",
        "SHS#4055",
        "HMAC#3312",
        "SHS#4054",
        "HMAC#3308",
        "SHS#4058",
        "RSA#2748",
        "SHS#4059",
        "KTS#4989",
        "ECDSA#1308",
        "KTS#5065",
        "KTS#4990",
        "DRBG#1806",
        "DRBG#1814",
        "HMAC#3375",
        "HMAC#3377",
        "HMAC#3318",
        "KTS#5063",
        "KTS#4988",
        "KTS#5071",
        "AES#4995",
        "DRBG#1812",
        "ECDSA#1309",
        "DRBG#1805",
        "DRBG#1810",
        "SHS#4052",
        "KTS#5072",
        "DRBG#1819",
        "HMAC#3317",
        "SHS#4056",
        "AES#5072",
        "DRBG#1876",
        "AES#4985",
        "AES#5055",
        "SHS#4060",
        "DRBG#1872",
        "AES#5065",
        "RSA#2741",
        "ECDSA#1313",
        "DRBG#1807",
        "SHS#4127",
        "Triple-DES#2615",
        "DRBG#1883",
        "KTS#5057",
        "DRBG#1878",
        "KTS#4992",
        "DRBG#1877",
        "Triple-DES#2613",
        "DRBG#1889",
        "DRBG#1888",
        "DRBG#1808",
        "ECDSA#1310",
        "HMAC#3315",
        "HMAC#3382",
        "HMAC#3319",
        "HMAC#3314",
        "KTS#5054",
        "RSA#2742",
        "SHS#4057",
        "KTS#4996",
        "HMAC#3313",
        "AES#4987",
        "HMAC#3311",
        "KTS#4987",
        "KTS#4994",
        "DRBG#1882",
        "SHS#4061",
        "AES#5054",
        "SHS#4062",
        "KTS#4991",
        "SHS#4121",
        "DRBG#1809",
        "HMAC#3316",
        "Triple-DES#2614",
        "DRBG#1874",
        "DRBG#1815",
        "SHS#4120",
        "AES#5056",
        "DRBG#1804",
        "DRBG#1875",
        "AES#4990",
        "DRBG#1818",
        "HMAC#3376",
        "AES#4992",
        "AES#5071",
        "AES#4991",
        "DRBG#1885",
        "KTS#4985",
        "AES#4993",
        "DRBG#1817",
        "AES#4989",
        "Triple-DES#2618",
        "KTS#5056",
        "AES#5057",
        "AES#4986",
        "KTS#4986",
        "SHS#4122",
        "AES#5063",
        "KTS#4993",
        "DRBG#1813",
        "SHS#4051",
        "KTS#4995"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 13
          }
        },
        "FF": {
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA-OAEP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CCM": {
          "CCM": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 7
        },
        "ECB": {
          "ECB": 8
        },
        "GCM": {
          "GCM": 3
        },
        "OFB": {
          "OFB": 2
        },
        "XTS": {
          "XTS": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 2
        },
        "NIST": {
          "P-192": 14,
          "P-224": 4,
          "P-256": 4,
          "P-384": 9,
          "P-521": 10,
          "curve P-384": 1
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 2
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-128": 2,
          "HMAC- SHA-512": 1,
          "HMAC-SHA-1": 14,
          "HMAC-SHA-224": 12,
          "HMAC-SHA-256": 4,
          "HMAC-SHA-256 1808": 2,
          "HMAC-SHA-256 1811": 2,
          "HMAC-SHA-256 1815": 2,
          "HMAC-SHA-256 3308": 2,
          "HMAC-SHA-256 3311": 2,
          "HMAC-SHA-256 3315": 2,
          "HMAC-SHA-384": 4,
          "PKCS #1": 1,
          "PKCS#1": 12,
          "RSA PKCS #1": 1,
          "SHA- 256": 1,
          "SHA-1": 5,
          "SHA-2": 1,
          "SHA-224": 4,
          "SHA-256": 3,
          "SHA-384": 2,
          "SHA-512": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 2
          },
          "MD5": {
            "MD5": 2
          }
        },
        "PBKDF": {
          "PBKDF": 3
        },
        "RIPEMD": {
          "RIPEMD": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1,
            "SHA-384": 5,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 23,
          "FIPS 180-4": 2,
          "FIPS 186-4": 3,
          "FIPS 197": 2,
          "FIPS 198": 1,
          "FIPS PUB 140-2": 1,
          "FIPS186-4": 2
        },
        "NIST": {
          "NIST SP 800-90A": 1,
          "SP 800-132": 1,
          "SP 800-38": 4,
          "SP 800-67": 1,
          "SP 800-90": 1,
          "SP 800-90A": 4
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 6
        },
        "RFC": {
          "RFC 6637": 1,
          "RFC6637": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11,
            "AES-128": 2
          },
          "CAST": {
            "CAST5": 2
          },
          "RC": {
            "RC2": 2,
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 10
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 8,
            "HMAC-SHA-512": 6
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/AAPL:Keywords": "[]",
      "/CreationDate": "D:20180312195111Z00\u002700\u0027",
      "/Creator": "Word",
      "/Keywords": "",
      "/ModDate": "D:20180312195111Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.12.6 Quartz PDFContext",
      "/Title": "Microsoft Word - TID-11-1514-Apple-Inc--140sp_CC8_4.1.doc",
      "pdf_file_size_bytes": 368186,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "5528481b784e15be57c0e02065226f00a2dfed39a86ace551928d6db4ba1b1c6",
    "policy_txt_hash": "3c51bc0bdd9404968a46adf1088c403716d98384fe199eeee51662841cc9bb53"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140-2-ConsolidatedMarch2018.pdf",
    "date_sunset": null,
    "description": "The Apple CoreCrypto Kerenl Module v8.0 for Intel is a software cryptographic module running on a multi-chip standalone hardware device and provides services intended to protect data in transit and at rest.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Physical Security: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Apple CoreCrypto Kernel Module v8.0 for Intel",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "8.0",
    "tested_conf": [
      "macOS High Sierra 10.13 running on iMac Pro with Xeon CPU with PAA",
      "macOS High Sierra 10.13 running on iMac Pro with Xeon CPU without PAA",
      "macOS High Sierra 10.13 running on Mac mini with i5 CPU with PAA",
      "macOS High Sierra 10.13 running on Mac mini with i5 CPU without PAA",
      "macOS High Sierra 10.13 running on MacBook Pro with i7 CPU with PAA",
      "macOS High Sierra 10.13 running on MacBook Pro with i7 CPU without PAA",
      "macOS High Sierra 10.13 running on MacBook with Core M CPU with PAA",
      "macOS High Sierra 10.13 running on MacBook with Core M CPU without PAA (single-user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2018-03-22",
        "lab": "atsec information security corporation",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-03-11",
        "lab": "atsec information security corporation",
        "validation_type": "Update"
      }
    ],
    "vendor": "Apple Inc.",
    "vendor_url": "http://www.apple.com"
  }
}