ZCM-100 Security Policy Rev. 1.2    ZyFLEX Crypto Module ZCM-100 Non-Proprietary Security Policy Rev. 1.2 ZyFLEX Technologies Inc.                                                                         ZCM-100 Security Policy Rev. 1.2               Revisions Date Rev. Author Note Jul. 29, 2011 0.1 Nick Tseng Initial Draft Aug. 29, 2011 1.0 Nick Tseng Rev. 1.0 First Release Nov. 11, 2011 1.1 Nick Tseng Responses to comments Feb. 17, 2012 Nick Tseng Responses to CMVP comments 1.2 © ZyFLEX Technologies Incorporation Page 1                                                                         ZCM-100 Security Policy Rev. 1.2               Contents REVISIONS..........................................................................................................1 CONTENTS..........................................................................................................2 FIGURES ..............................................................................................................4 TABLES ................................................................................................................5 1. INTRODUCTION........................................................................................6 1.1. DOCUMENT PURPOSE ............................................................................6 1.2. MODULE OVERVIEW..............................................................................6 1.3. MODULE SPECIFICATION........................................................................6 2. SECURITY LEVEL .....................................................................................9 3. MODES OF OPERATION.........................................................................10 3.1. FIPS APPROVED MODE OF OPERATION ...............................................10 3.2. FIPS APPROVED SECURITY FUNCTIONS ..............................................10 3.3. OTHER ALLOWED SECURITY FUNCTIONS ............................................11 4. PORTS AND INTERFACES .....................................................................12 4.1. PHYSICAL PORTS .................................................................................12 4.2. LOGICAL INTERFACES..........................................................................13 5. IDENTIFICATION AND AUTHENTICATION POLICY........................15 5.1. CRYPTO OFFICER (CO) ROLE ..............................................................15 5.2. USER ROLE..........................................................................................15 5.3. AUTHENTICATION................................................................................16 © ZyFLEX Technologies Incorporation Page 2                                                                         ZCM-100 Security Policy Rev. 1.2               6. ACCESS CONTROL POLICY AND KEY MANAGEMENT .................17 6.1. DESCRIPTIONS OF SERVICES ................................................................17 6.2. ROLES, SERVICES AND ACCESS RIGHTS ...............................................19 6.3. KEYS AND CSPS MANAGEMENT..........................................................21 6.4. ZEROIZATIONS .....................................................................................24 7. PHYSICAL SECURITY POLICY.............................................................25 8. OPERATIONAL ENVIRONMENT ..........................................................26 9. SELF-TESTS..............................................................................................27 9.1. POWER-UP TEST..................................................................................27 9.2. CONDITIONAL TEST .............................................................................27 10. DESIGN ASSURANCE.............................................................................28 11. MITIGATION OF OTHER ATTACKS POLICY......................................29 12. CRYPTO OFFICER AND USER GUIDANCE ........................................30 12.1. USER GUIDANCE .................................................................................30 12.2. CRYPTO OFFICER GUIDANCE ...............................................................30 13. REFERENCES & ACRONYMS ...............................................................31 © ZyFLEX Technologies Incorporation Page 3                                                                         ZCM-100 Security Policy Rev. 1.2               Figures Figure 1 ZCM-100 Photos ...............................................................................7 Figure 2 ZCM-100 Hardware Block Diagram .................................................7 Figure 3 ZCM-100 Connectors ......................................................................12 © ZyFLEX Technologies Incorporation Page 4                                                                         ZCM-100 Security Policy Rev. 1.2               Tables Table 1 – Security Level per FIPS 140-2 Areas....................................................9 Table 2a – FIPS Approved Security Functions...................................................11 Table 2b – Other Allowed Security Functions....................................................11 Table 3 – Physical Port J1 ...................................................................................12 Table 4 – Physical Port J2 ...................................................................................13 Table 5 – Logical Interfaces................................................................................14 Table 6 – Roles, Identities and Authentication ...................................................16 Table 7 – Strengths of Authentication Mechanism .............................................16 Table 8 – Services ...............................................................................................19 Table 9 – Access Rights ......................................................................................20 Table 10 – Keys and CSPs Management ............................................................24 © ZyFLEX Technologies Incorporation Page 5                                                                         ZCM-100 Security Policy Rev. 1.2               1. INTRODUCTION 1.1. Document Purpose This document contains the Security Policy, User Guidance and Crypto Officer Guidance for the ZyFLEX Crypto Module ZCM-100, hereinafter referred to as ZCM-100 or the module. 1.2. Module Overview ZCM-100 (Firmware Version: 1.1; Hardware Version: AAM) is a hardware multichip embedded module that targets high speed data link layer (OSI layer 2) secure data transmission applications in an IP-based network. ZCM-100 implements AES-256 encryption/decryption algorithm and other security functions by using both hardware FPGA circuitry and a 32-bit microcontroller. Its miniaturized size and low power consumption features make ZCM-100 suitably fit in a portable wireless communication device such as a handheld radio. ZCM-100 is designed to conform to level 3 of FIPS 140-2 standard. Please visit http://csrc.nist.gov/publicationss/fips/fips140-2/fips1402.pdf for details about the standard. 1.3. Module Specification Figure 1 shows photos of ZCM-100, with all of its interfaces provided through two 20-pin board-to-board connectors J1 & J2. Pin-outs of these connectors are described in section 4.1. © ZyFLEX Technologies Incorporation Page 6                                                                         ZCM-100 Security Policy Rev. 1.2               J2 J1  Figure 1: ZCM-100 Photos. Left: Top-view, Right: Bottom-view Removed Detect Ciptertext Data Ciptertext Data Plaintext Data Plaintext Data Power Signal Status Output Control Input Removed Detect Key Access External Battery Figure 2: ZCM-100 Hardware Block Diagram © ZyFLEX Technologies Incorporation Page 7                                                                         ZCM-100 Security Policy Rev. 1.2               Figure 2 is a hardware block diagram showing ZCM-100’s internal circuitry. ZCM-100 needs to be mounted on a host system board where a “host” microprocessor acts as a master device to send control commands as well as plaintext/ciphertext data to ZCM-100. The host system board also provides power inputs (DC3.3V, 1.2V and a battery voltage of 3.3V) to ZCM-100. ZCM-100 uses an FPGA to implement the AES-256 cryptographic algorithm (the AES Core). Besides, there is a 32-bit microprocessor designed within the FPGA, and this microprocessor acts as a slave device to respond to the host system’s commands and provides some other cryptographic services such as: 1. AES 256 encryption & decryption 2. Key storage 3. Signature generation and verification 4. Generation of message digest The keys and CSPs are stored in the Key & CSP storage memory provided by a logic device, whose power is backed-up by an external battery voltage of 3.3V. ZCM-100 features a secure tamper detection design: when it is being tried to be removed from the host system board, its tamper detector circuitry will automatically zeroize all the keys stored inside ZCM-100 even when power is cut off. For physical ports/logical interfaces descriptions of ZCM-100, please refer to sections 4.1 & 4.2. © ZyFLEX Technologies Incorporation Page 8                                                                         ZCM-100 Security Policy Rev. 1.2               2. SECURITY LEVEL ZCM-100 meets the overall requirements applicable to FIPS140-2 Security Level 3. In the individual requirement areas of FIPS 140-2 the following Security Level ratings are achieved: Area Area Title Level 1 Cryptographic Module Specification 3 2 Cryptographic Module Ports and Interfaces 3 3 Roles, Services, and Authentication 3 4 Finite State Model 3 5 Physical Security 3 6 Operational Environment N/A 7 Cryptographic Key Management 3 8 EMI/EMC 3 9 Self-tests 3 10 Design Assurance 3 11 Mitigation of Other Attacks N/A Table 1 – Security Level per FIPS 140-2 Areas © ZyFLEX Technologies Incorporation Page 9                                                                         ZCM-100 Security Policy Rev. 1.2               3. MODES OF OPERATION 3.1. FIPS Approved Mode of Operation When ZCM-100 powers up, it will execute self-test first; if the self-test passes ZCM-100 will issue a status report indicating that it is entering the login state and operating in the FIPS Approved mode automatically, without any operator’s intervention. ZCM-100 only operates in a FIPS Approved mode of operation, comprising all services described in section 6.1. The module does not implement bypass or maintenance modes. 3.2. FIPS Approved Security Functions The following table gives the list of FIPS Approved security functions provided by the module. Security CAVP Details Function Cert. # FIPS 186-3: SIG(gen) [(1024,160) SHA (1,224,256,384,512);(2048,224) SHA(1,224,256,384,512); (2048,256) SHA(1,224,256,384,512); (3072,256) SHA(1,224,256,384,512)] DSA #521 SIG(ver) [(1024,160) SHA (1,224,256,384,512);(2048,224) SHA(1,224,256,384,512); (2048,256) SHA(1,224,256,384,512); (3072,256) SHA(1,224,256,384,512)] SHS: Val# 1462; RNG: Val# 888 ECB ( e/d; 128 , 192 , 256 ); CBC ( e/d; 128 , 192 , 256 ); CFB128 (e/d; 128, 192, 256); OFB (e/d; 128, 192, 256); #1670 AES CCM (KS: 128, 192, 256) (Assoc. Data Len Range: 0-14) (Payload #1671 Length Range: 2-32)(Nonce Length(s): 13) (Tag Length(s): 4 6 8 10 12 14 16) SHA-1 (BYTE-only); SHA-224 (BYTE-only); SHA-256 SHS #1462 (BYTE-only); SHA-384 (BYTE-only); SHA-512 (BYTE-only) © ZyFLEX Technologies Incorporation Page 10                                                                         ZCM-100 Security Policy Rev. 1.2               Security CAVP Details Function Cert. # #888 ANSI X9.31 RNG [ AES-128Key AES-192Key AES-256Key ] #889 FIPS 186-3: ALG[RSASSA-PKCS1_V1_5]; SIG(gen); SIG(ver): ( 1024 SHA(1, RSA #827 224, 256, 384, 512)) (2048 SHA(1, 224, 256, 384, 512)) (3072 SHA(1,224,256,384,512)) SHS: SHA (Cert. #1462) HMAC-SHA1 (Key Sizes Ranges Tested: KSBS ) SHS (Cert. #1462) HMAC-SHA224 (Key Sizes Ranges Tested: KSBS ) SHS (Cert. #1462) HMAC-SHA256 (Key Sizes Ranges Tested: KSBS ) SHS HMAC #980 (Cert. #1462) HMAC-SHA384 ( Key Size Ranges Tested: KS