This page was not yet optimized for use on mobile devices.
Samsung NVMe TCG Opal SSC SEDs PM1743/PM1745 Series
Certificate #4879
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, AES-256, AES-, HMACAsymmetric Algorithms
ECDSAHash functions
PBKDF2Randomness
DRBGElliptic Curves
Curve P-384, P-384Block cipher modes
ECB, GCMTrusted Execution Environments
SSCVendor
SamsungSecurity level
level 2, Level 1, Level 2Certification process
out of scope, or the rules in Section 11 will result in the module operating in a non-compliant state, which is out of scope for this validation. The following specifies the security rules under which the cryptographicStandards
FIPS 140-3, FIPS 197, FIPS 186-4, FIPS 198-1, FIPS 180-4, SP 800-38A, SP 800-38E, SP 800-38D, SP 800-132, SP 800-90A, SP 800-90B, NIST SP 800-132, ISO/IEC 24759, ISO/IEC 19790:20 12File metadata
Creation date | D:20241029144609-05'00' |
---|---|
Modification date | D:20241029144609-05'00' |
Pages | 24 |
References
Outgoing- 4661 - active - Juniper Networks EX4650, QFX5120 and QFX5210 Ethernet Switches
Heuristics ?
No heuristics are available for this certificate.
References ?
Updates ?
-
18.11.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4879,
"dgst": "d0a04b4400e5d231",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHA2-384A4663",
"AES-XTS Testing Revision 2.0A4661",
"Counter DRBGA4846",
"AES-ECBA4846",
"ECDSA SigVer (FIPS186-4)A4663",
"HMAC-SHA2-256A4663",
"AES-GCMA4663",
"PBKDFA4663",
"SHA2-256A4663"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"2",
"1",
"3"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"4661"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"4661"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"4661"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 12
}
}
},
"certification_process": {
"OutOfScope": {
"or the rules in Section 11 will result in the module operating in a non-compliant state, which is out of scope for this validation. The following specifies the security rules under which the cryptographic": 1,
"out of scope": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 4
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {
"NIST": {
"Curve P-384": 2,
"P-384": 4
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 2,
"#4661": 1,
"#4662": 2,
"#4663": 3
}
},
"fips_certlike": {
"Certlike": {
"AES 256": 2,
"AES-256": 16,
"AES-GCM (#4663": 1,
"DRBG (#4662": 2,
"DRBG3": 1,
"DRBG4": 1,
"HMAC6": 2,
"SHA2- 384": 1,
"SHA2- 38417": 1,
"SHA2-256": 13,
"SHA2-2567": 1,
"SHA2-265": 1,
"SHA2-384": 8
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 1,
"level 2": 1
}
},
"hash_function": {
"PBKDF": {
"PBKDF2": 14
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 36
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 11,
"FIPS 180-4": 2,
"FIPS 186-4": 1,
"FIPS 197": 8,
"FIPS 198-1": 1
},
"ISO": {
"ISO/IEC 19790:20 12": 1,
"ISO/IEC 24759": 2
},
"NIST": {
"NIST SP 800-132": 1,
"SP 800-132": 1,
"SP 800-38A": 4,
"SP 800-38D": 1,
"SP 800-38E": 2,
"SP 800-90A": 5,
"SP 800-90B": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3,
"AES-": 2,
"AES-256": 16
}
},
"constructions": {
"MAC": {
"HMAC": 6
}
}
},
"tee_name": {
"IBM": {
"SSC": 6
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 31
}
},
"vulnerability": {}
},
"policy_metadata": {
"/CreationDate": "D:20241029144609-05\u002700\u0027",
"/ModDate": "D:20241029144609-05\u002700\u0027",
"pdf_file_size_bytes": 1000687,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "a2557be9d09e6d993512f6b0320cbc7a843465a46915f90100054f613e48e29b",
"policy_txt_hash": "ef0077645488c1b02de6119208a7f14befa0120b2962d7b289385988eec54851"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "Interim Validation. When installed, initialized and configured as specified in Section 11.1 of the Security Policy. The tamper evident seals installed as indicated in the Security Policy. No operator authentication is enforced for executing security services that were unlocked by an authenticated service",
"certificate_pdf_url": null,
"date_sunset": "2026-11-13",
"description": "The Samsung NVMe TCG Opal SSC SEDs PM1743/PM1745 Series SSD (Solid State Drive), satisfies all applicable FIPS 140-3 security level 2 requirements, supporting TCG Opal SSC based SED (Self-Encrypting Drive) features, designed to protect unauthorized access to the user data stored in its NAND Flash memories. The built-in AES hardware engines in the cryptographic module\u2019s controller provide on-the-fly encryption and decryption of the user data without performance loss. The SED\u2019s nature also provides instantaneous sanitization of the user data via cryptographic erase.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Operational environment: N/A",
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A",
"Documentation requirements: N/A",
"Cryptographic module security policy: N/A"
],
"fw_versions": "OPP90D5Q [1], 3P00 [2], 3R00 [3]",
"historical_reason": null,
"hw_versions": "MZWLO1T9HCJR-00AD9 [1], MZWLO3T8HCLS-00AD9 [1], MZWLO7T6HBLA-00AD9 [1], MZWLO15THBLA-00AD9 [1], MZWLO1T6HCJR-00AD9 [1], MZWLO3T2HCLS-00AD9 [1], MZWLO6T4HBLA-00AD9 [1], MZWLO12THBLA-00AD9 [1], MZWLO1T9HCJR-00AH9 [2], MZWLO3T8HCLS-00AH9 [2], MZWLO7T6HBLA-00AH9 [2], MZWLO15THBLA-00AH9 [2], MZWLO1T9HCJR-00AH8 [3], MZWLO3T8HCLS-00AH8 [3], MZWLO7T6HBLA-00AH8 [3], MZWLO15THBLA-00AH8 [3]",
"level": 2,
"mentioned_certs": {},
"module_name": "Samsung NVMe TCG Opal SSC SEDs PM1743/PM1745 Series",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-11-14",
"lab": "LEIDOS CSTL",
"validation_type": "Initial"
}
],
"vendor": "Samsung Electronics Co., Ltd.",
"vendor_url": "http://www.samsung.com"
}
}