Certificate 2015 - Apple OS X CoreCrypto Module, v4.0
intCertNum 2015
strVendorName Apple Inc.
strURL http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/CMVPvalDBNoLink.htm
strAddress1 1 Infinite Loop
strAddress2
strAddress3
strCity Cupertino
strStateProv CA
strPostalCode 95041
strCountry 95041
strContact Shawn Geddis
strEmail geddis@apple.com
strPhone
strFax
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2015
strModuleName Apple OS X CoreCrypto Module, v4.0
strPartNumber Software Version: 4.0
memModuleNotes When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 11/07/2013
intOverallLevel 1
memIndividualLevelNotes ;;-Operational Environment: Tested as meeting Level 1 with OS X 10.9 running on Mac mini with i5 CPU with PAA; OS X 10.9 running on Mac mini with i5 CPU without PAA; OS X 10.9 running on iMac with i7 CPU with PAA; OS X 10.9 running on iMac with i7 CPU without PAA (single-user mode)
strFIPSAlgorithms Triple-DES (Certs. #1534, #1535, #1536 and #1537);
AES (Certs. #2519, #2520, #2521, #2523, #2524, #2027, #2528, #2529, #2530, #2531, #2532, #2533, #2534, #2535, #2536, #2537, #2538, #2539, #2540 and #2541);
RSA (Certs. #1293, #1294, #1295 and #1296);
SHS (Certs. #2130, #2131, #2132, #2133, #2134, #2135, #2136, #2137, #2138, #2139, #2140 and #2141);
ECDSA (Certs. #432, #433, #434 and #435);
HMAC (Certs. #1552, #1553, #1554, #1555, #1556, #1557, #1558, #1559, #1560, #1561, #1562 and #1563);
DRBG (Certs. #364, #365, #366, #367, #368, #369, #370, #371, #372, #373, #374 and #375);
PBKDF (vendor affirmed)
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides 128 or 160 bits of encryption strength);
ECDSA (P-192, P-224 and P-521;
non-compliant);
RSA (non-compliant);
DES;
MD2;
MD4;
MD5;
CAST5;
RIPEMD;
Blowfish;
BitGen1;
BitGen2;
BitGen3;
RC2;
RC4;
OMAC
strConfiguration Multi-chip standalone
memModuleDescription The Apple OS X CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 11/07/13 00:00:00
strLabName atsec
strValidationYear 2013