Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cryptographic Module Validation Program CMVP

Certificate #2015

Details

Module Name
Apple OS X CoreCrypto Module, v4.0
Standard
FIPS 140-2
Status
Historical
 Historical Reason
Moved to historical list due to sunsetting
Overall Level
1
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Module Type
Software
Embodiment
Multi-chip standalone
Description
The Apple OS X CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
Tested Configuration(s)
  • OS X 10.9 running on iMac with i7 CPU with PAA
  • OS X 10.9 running on iMac with i7 CPU without PAA (single-user mode)
  • OS X 10.9 running on Mac mini with i5 CPU with PAA
  • OS X 10.9 running on Mac mini with i5 CPU without PAA
Approved Algorithms
AES Certs. #2519, #2520, #2521, #2523, #2524, #2027, #2528, #2529, #2530, #2531, #2532, #2533, #2534, #2535, #2536, #2537, #2538, #2539, #2540 and #2541
DRBG Certs. #364, #365, #366, #367, #368, #369, #370, #371, #372, #373, #374 and #375
ECDSA Certs. #432, #433, #434 and #435
HMAC Certs. #1552, #1553, #1554, #1555, #1556, #1557, #1558, #1559, #1560, #1561, #1562 and #1563
PBKDF vendor affirmed
RSA Certs. #1293, #1294, #1295 and #1296
SHS Certs. #2130, #2131, #2132, #2133, #2134, #2135, #2136, #2137, #2138, #2139, #2140 and #2141
Triple-DES Certs. #1534, #1535, #1536 and #1537
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 160 bits of encryption strength); ECDSA (P-192, P-224 and P-521; non-compliant); RSA (non-compliant); DES; MD2; MD4; MD5; CAST5; RIPEMD; Blowfish; BitGen1; BitGen2; BitGen3; RC2; RC4; OMAC
Software Versions
4.0

Vendor

Apple Inc.
1 Infinite Loop
Cupertino, CA 95041
USA

Shawn Geddis
geddis@apple.com

Validation History

Date Type Lab
11/7/2013 Initial ATSEC INFORMATION SECURITY CORP