Module Name
Apple iOS CoreCrypto Module, v4.0
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Module Type
Software-Hybrid
Embodiment
Multi-chip standalone
Description
The Apple iOS CoreCrypto Module is a software cryptographic module running on a multi-chip standalone mobile device and provides services intended to protect data in transit and at rest.
Tested Configuration(s)
- iOS 7.0 running on an iPhone4 with Apple A4 CPU
- iOS 7.0 running on an iPhone4S with Apple A5 CPU
- iOS 7.0 running on an iPhone5 with Apple A6 CPU
- iOS 7.0 running on an iPhone5 with Apple A7 CPU (single-user mode)
- iOS 7.0 running on iPad (3rd generation) with Apple A5 CPU
Approved Algorithms
AES |
Certs. #2499, #2500, #2501, #2502, #2503, #2504, #2505, #2506, #2507, #2508, #2509, #2547, #2657, #2658, #2659, #2660, #2661 and #2662 |
DRBG |
Certs. #353, #354, #355, #356, #357, #380, #423, #424, #425 and #426 |
ECDSA |
Certs. #428, #429, #437, #459 and #460 |
HMAC |
Certs. #1541, #1542, #1568, #1589, #1591, #1593, #1648, #1649, #1650 and #1651 |
PBKDF |
vendor affirmed |
RSA |
Certs. #1289, #1290, #1302, #1367 and #1368 |
SHS |
Certs. #2119, #2120, #2148, #2168, #2170, #2172, #2230, #2231, #2232 and #2233 |
Triple-DES |
Certs. #1530, #1531, #1542, #1596 and #1597 |
Other Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides 128 or 160 bits of encryption strength); RSA (non-compliant); ECDSA (non-compliant); DES; MD2; MD4; MD5; RIPEMD; CAST5; Blowfish; BitGen1; BitGen2; BitGen3; RC2; RC4; OMAC
Hardware Versions
A4, A5, A6 and A7