Module Name
Samsung SCrypto Cryptographic Module
Historical Reason
SP 800-56Arev3 transition - replaced by certificate #4478
Caveat
When operated in FIPS mode
Security Level Exceptions
- Physical Security: N/A
- EMI/EMC: Level 3
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
SCrypto is secure library which is used to provide a standardized common cryptographic API to trusted applications for the secure world/TEE environment.
Tested Configuration(s)
- QSEE 5.10 (32-bit) with processor Qualcomm SM7250 running on Samsung Galaxy A71
- QSEE 5.10 (32-bit) with processor Qualcomm Snapdragon 750 running on Samsung Galaxy A42
- QSEE 5.10 (64-bit) with processor Qualcomm SM7250 running on Samsung Galaxy A71
- QSEE 5.10 (64-bit) with processor Qualcomm Snapdragon 750 running on Samsung Galaxy A42
- QSEE 5.11 (32-bit) with processor Qualcomm Snapdragon 888 running on Samsung Galaxy S21+
- QSEE 5.11 (64-bit) with processor Qualcomm Snapdragon 888 running on Samsung Galaxy S21+ (single-user mode)
- QSEE 5.8 (32-bit) with processor Qualcomm SM8250 running on Samsung Galaxy S20+
- QSEE 5.8 (64-bit) with processor Qualcomm SM8250 running on Samsung Galaxy S20+
- TEEGRIS 4.0 (32-bit) with processor Samsung Electronics Exynos 9810 on Samsung Galaxy Tab Active3
- TEEGRIS 4.0 (64-bit) with processor Samsung Electronics Exynos 9810 on Samsung Galaxy Tab Active3
- TEEGRIS 4.1 (32-bit) with processor Samsung Electronics Exynos 990 running on Samsung Galaxy S20+
- TEEGRIS 4.1 (64-bit) with processor Samsung Electronics Exynos 990 running on Samsung Galaxy S20+
Approved Algorithms
AES |
Certs. #C1360 and #A889 |
CKG |
vendor affirmed |
CVL |
Certs. #C1360 and #A889 |
DRBG |
Certs. #C1360 and #A889 |
ECDSA |
Certs. #C1360 and #A889 |
HMAC |
Certs. #C1360 and #A889 |
KBKDF |
Certs. #C1360 and #A889 |
KTS |
AES Certs. #C1360 and #A889; key establishment methodology provides between 128 and 256 bits of encryption strength |
RSA |
Certs. #C1360 and #A889 |
SHS |
Certs. #C1360 and #A889 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C1360 and #A889, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG; RSA (Certs. #C1360 and #A889, key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength)