Module Name
Apple OS X CoreCrypto Module, v4.0
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Embodiment
Multi-chip standalone
Description
The Apple OS X CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
Tested Configuration(s)
- OS X 10.9 running on iMac with i7 CPU with PAA
- OS X 10.9 running on iMac with i7 CPU without PAA (single-user mode)
- OS X 10.9 running on Mac mini with i5 CPU with PAA
- OS X 10.9 running on Mac mini with i5 CPU without PAA
Approved Algorithms
AES |
Certs. #2519, #2520, #2521, #2523, #2524, #2027, #2528, #2529, #2530, #2531, #2532, #2533, #2534, #2535, #2536, #2537, #2538, #2539, #2540 and #2541 |
DRBG |
Certs. #364, #365, #366, #367, #368, #369, #370, #371, #372, #373, #374 and #375 |
ECDSA |
Certs. #432, #433, #434 and #435 |
HMAC |
Certs. #1552, #1553, #1554, #1555, #1556, #1557, #1558, #1559, #1560, #1561, #1562 and #1563 |
PBKDF |
vendor affirmed |
RSA |
Certs. #1293, #1294, #1295 and #1296 |
SHS |
Certs. #2130, #2131, #2132, #2133, #2134, #2135, #2136, #2137, #2138, #2139, #2140 and #2141 |
Triple-DES |
Certs. #1534, #1535, #1536 and #1537 |
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 160 bits of encryption strength); ECDSA (P-192, P-224 and P-521; non-compliant); RSA (non-compliant); DES; MD2; MD4; MD5; CAST5; RIPEMD; Blowfish; BitGen1; BitGen2; BitGen3; RC2; RC4; OMAC