Certificate 2594 - Apple iOS CoreCrypto Module v6.0
intCertNum 2594
strVendorName Apple Inc.
strURL http://www.apple.com
strAddress1 1 Infinite Loop
strAddress2
strAddress3
strCity Cupertino
strStateProv CA
strPostalCode 95041
strCountry 95041
strContact Shawn Geddis
strEmail geddis@apple.com
strPhone (669)227-3579
strFax (866)315-1954
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2594
strModuleName Apple iOS CoreCrypto Module v6.0
strPartNumber Software Version: 6.0
memModuleNotes When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Software
strValidationDate 03/29/2016
intOverallLevel 1
memIndividualLevelNotes -Physical Security: N/A;-Operational Environment: iOS 9.0 running on iPhone4S with Apple A5 CPU with AES hardware acceleration; iOS 9.0 running on iPhone4S with Apple A5 CPU without AES hardware acceleration; iOS 9.0 running on iPhone5 with Apple A6 CPU with AES hardware acceleration;
iOS 9.0 running on iPhone5 with Apple A6 CPU without AES hardware acceleration; iOS 9.0 running on iPhone5S with Apple A7 CPU; iOS 9.0 running on iPhone6 (iPhone6 and iPhone6 Plus) with Apple A8 CPU; iOS 9.0 running on iPhone6S (iPhone6S and iPhone6S Plus) with Apple A9 CPU; iOS 9.0 running on iPad (3rd generation) with Apple A5X CPU with AES hardware acceleration; iOS 9.0 running on iPad (3rd generation) with Apple A5X CPU without AES hardware acceleration; iOS 9.0 running on iPad (4th generation) with Apple A6X CPU with AES hardware acceleration; iOS 9.0 running on iPad (4th generation) with Apple A6X CPU without AES hardware acceleration; iOS 9.0 running on iPad Air 2 with Apple A8X CPU; iOS 9.1 running on iPad Pro with Apple A9X CPU (single-user mode)
strFIPSAlgorithms AES (Certs. #3682, #3683, #3684, #3685, #3686, #3687, #3688, #3689, #3690, #3691, #3692, #3693, #3694, #3695, #3698, #3699, #3700, #3701, #3702, #3703, #3704, #3705, #3706, #3707, #3708, #3709, #3710, #3712, #3713, #3714, #3715, #3716, #3717, #3718, #3719, #3720, #3721, #3722, #3723, #3724, #3725, #3726, #3727, #3728, #3740 and #3750);
CVL (Certs. #683, #684, #685, #686, #687, #688, #689, #690, #691, #692, #693, #694, #695 and #698);
DRBG (Certs. #989, #990, #991, #992, #993, #994, #995, #996, #997, #999, #1000, #1001, #1002, #1004, #1005, #1006, #1007, #1008, #1009, #1010, #1011, #1012, #1013, #1014, #1015 and #1016);
ECDSA (Certs. #777, #778, #779, #780, #781, #782, #783, #784, #785, #786, #787, #788, #789 and #793);
HMAC (Certs. #2302, #2304, #2306, #2307, #2309, #2310, #2311, #2312, #2313, #2314, #2315, #2316, #2317, #2428, #2429, #2430, #2431, #2432, #2433, #2434, #2435, #2436, #2437, #2438, #2439, #2440 and #2444);
KTS (AES Certs. #3682, #3683, #3684, #3685, #3686, #3687, #3688, #3689, #3690, #3691, #3692, #3693, #3694, #3695, #3698, #3699, #3700, #3701, #3702, #3703, #3704, #3705, #3706, #3707, #3708, #3709, #3710, #3712, #3713, #3714, #3715, #3716, #3717, #3718, #3719, #3720, #3721, #3722, #3723, #3724, #3725, #3726, #3727, #3728, #3740 and #3750;
key establishment methodology provides between 128 and 160 bits of encryption strength);
RSA (Certs. #1904, #1905, #1906, #1907, #1908, #1909, #1910, #1911, #1912, #1914, #1915, #1916, #1919 and #1920);
SHS (Certs. #2968, #2970, #2972, #2973, #2974, #2975, #2976, #2977, #2978, #2979, #2980, #2981, #2982, #2983, #3096, #3097, #3098, #3099, #3100, #3101, #3102, #3103, #3104, #3105, #3106, #3107, #3108 and #3113);
Triple-DES (Certs. #2060, #2061, #2062, #2063, #2064, #2065, #2066, #2067, #2068, #2069, #2070, #2071, #2072 and #2078);
PBKDF (vendor affirmed)
strOtherAlgorithms AES (non-compliant);
ANSI X9.63 KDF;
Blowfish;
CAST5;
DES;
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides 128 or 160 bits of encryption strength);
ECDSA (non-compliant);
Ed25519;
Hash_DRBG (non-compliant);
HMAC_DRBG (non-compliant);
Integrated Encryption Scheme on elliptic curves;
KBKDF (non-compliant);
MD2;
MD4;
MD5;
OMAC (One-Key CBC MAC);
RFC6637 KDF;
RIPEMD;
RC2;
RC4;
RSA (key wrapping;
key establishment methodology provides between 112 and 150 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RSA (non-compliant);
Triple-DES (non-compliant)
strConfiguration Multi-Chip Stand Alone
memModuleDescription The Apple iOS CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 03/29/16 00:00:00
strLabName atsec
strValidationYear 2016