background image

 

 

Mercury Systems 

ASURRE

-Stor

®

 

SSD 

 

 

 

 

 

 

 

   Administrative Guidance 

 

 
Copyright 2020   Mercury Systems.  May only be reproduced in its original form (without revision) 

Rev. 1.5.1   February 2020    © 2020 Mercury Systems.   All rights reserved 

 

Mercury Systems, Inc. • (602) 437-1520 •  

www.mrcy.com

 

7

 

256, 

SP 800‐38F)

 the DEK.  The TOE then overwrites the password that was entered by the CO and the derived key 

(BEV/KEK) resulting from the PBKDF function and saves the wrapped DEK in NVRAM.  After configuration completes, 
the CO exits the Crypto Officer role.  At this point the TOE is operational and ready to accept mission data in a User 
Role.  Mission personnel load mission data into the TOE then turn off TOE power.  Removing power purges the DEK 
from the TOE.  In the powered-off state the TOE contains only the wrapped DEK located in NVRAM.  

The TOE is transported to the mission vehicle and installed.  The mission vehicle host system provides the password.  
The TOE conditions the password with PBKDF to create a derived key (BEV/KEK) that is then used to un-wrap (AES-KW-
256, 

SP 800‐38F)

 the DEK.  If the unwrap operation completes successfully and the resulting DEK is the correct DEK, the 

TOE enters a normal operating mode which allows the mission to begin.  When the mission completes, TOE data, if 
applicable, is retrieved.   

The TOE retains the AES wrapped DEK across power cycles in NVRAM, however; the password must fill on each power 
cycle to complete the key chain. 

Mode 6: ATA password with KEK and BLACK key 

Pre-configuration operations, separate from the TOE, are described below. 

In Mode 6, the Crypto Officer (CO) begins by creating three keys, a 256-bit BEV(KEK), a 512-bit DEK, and a 576-bit BLACK 
key.  The DEK consists of a 256-bit AES key and a different 256-bit XTS key.  The CO uses the BEV(KEK) and AES key wrap 
(AES-KW-256, SP 800-38F) to wrap the DEK.  The resulting wrapped DEK is referred to as the BLACK key.  The CO and 
mission personnel must retain the BLACK key for filling the TOE at each mission power-on cycle. 

TOE configuration operations (performed on the TOE): 

The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6.  The CO fills the 
BEV(KEK) and enters a password of up to 64 characters.  The TOE conditions the password with PBKDF (Password Based 
Key Derivation Function SP 800-132) to create a derived 256-bit key that the TOE uses to AES key wrap (AES-KW-256, SP 

800‐38

F) the BEV(KEK).  The TOE saves the wrapped BEV(KEK) in NVRAM.  The CO then cycles TOE power off then on 

again. 

Next, the CO fills the TOE with the password followed by the BLACK key.  The TOE conditions the password using PBKDF  
(Password Based Key Derivation Function SP 800-132) to create a derived intermediate key and uses it to AES unwrap 
(AES-KW-256, 

SP 800‐38F)

 the BEV(KEK).  The TOE then uses the BEV(KEK) to unwrap the BLACK key re-creating the DEK 

and completing the key chain.   The TOE overwrites the password and derived key.  The CO exits the Crypto Officer role.   

At this point the TOE is operational and ready to accept mission data in a User Role.  Mission personnel load mission 
data into the TOE then turn off TOE power.  Removing power purges the DEK and unwrapped BEV from the TOE RAM.  
In the powered off state, the TOE contains only the wrapped BEV(KEK) in NVRAM. 

The TOE is transported to the mission vehicle and installed.  The mission vehicle host system provides the password and 
the BLACK key.  The TOE conditions the password with PBKDF to create a derived intermediate key that the TOE uses to 
unwrap the BEV(KEK) previously saved in NVRAM.  If the unwrap operation succeeds, the TOE uses the BEV(KEK) to 
unwrap the BLACK key.  If the unwrap operation succeeds and the resulting DEK is the correct DEK, the TOE enters a 
normal operating mode which allows the mission to begin. 

 When the mission completes, TOE data, if applicable, is retrieved.   

The TOE retains the AES wrapped BEV(KEK) in NVRAM across power cycles.  The password and BLACK key must fill on 
each power cycle to complete the key chain. 

5

 

Failed attempts penalty 

The TOE supports a feature to limit the number of sequential failed attempts to enter correct passwords, key values, 
and correct digital signature during firmware updates.  When the maximum number of failed attempts count is 

Содержание ASURRE-Stor ADR256

Страница 1: ...20 Mercury Systems All rights reserved Mercury Systems ASURRE Stor SSD Administrative Guidance Mercury Systems ASURRE Stor ASD256 512 and ADR256 512 Solid State Self Encrypting Drives Non Proprietary...

Страница 2: ...oduct Identification 8 11 Evaluated Configuration 9 12 Part numbers 10 13 Scope of evaluation 11 14 Operating Environment 11 15 Operating environment assumptions and requirements 12 16 Unattended oper...

Страница 3: ...y 17 Table 7 LED Indicator Port 17 Table 8 Password strength in bits 21 List of Figures Figure 1 View of the holographic label located in the center of the main label 9 Figure 2 Images of the ASURRE S...

Страница 4: ...ration of the TOE Please note that use of the MDU utility is optional and not part of the evaluation Programmer s Guide or SSD Programmer s Guide ssdProgrammersGuide pdf This document provides detaile...

Страница 5: ...Maximum which determine how the TOE behaves when the Master Password issued to unlock the device Refer to the ATA7 specification V1 page 22 MDU MDU Utility Mercury Systems Drive Utility MDU is a Windo...

Страница 6: ...r unencrypted shadow MBR sectors or 3rd party Opal software The ASURRE Stor SSD was evaluated against the Common Criteria Collaborative Protection Profile for Full Drive Encryption Encryption Engine v...

Страница 7: ...erformed on the TOE The CO configures the TOE using MDU or a similar custom utility program to operate in Mode 6 The CO fills the BEV KEK and enters a password of up to 64 characters The TOE condition...

Страница 8: ...ower is removed from the TOE the TOE enters power state D3 cold a fully powered off condition Only power state D0 allows access to plain text data Since SSDs never receive warning of imminent power lo...

Страница 9: ...ommand described in SSD Secure Configuration Programmer s Guide section 2 2 to verify that the TOE reports Firmware revision number 1 5 1 Alternatively the MDU utility can be used Refer to MDU section...

Страница 10: ...0 Standard product 1 Electrically isolate enclosure 2 Erase pin 1 option Trigger an erase sanitize operation from SATA pin P1 Option Field z 0 Standard product 1 Legacy erase option Same as field y O...

Страница 11: ...and is conditioned by PBKDF SP 800 132 to create an intermediate derived key that is used to AES key wrap AES KW 256 SP 800 38F the DEK The wrapped DEK is saved in NVRAM During normal operation On ea...

Страница 12: ...fill cables and any needed voltage translation The Administrator and or system designers shall implement application techniques safeguards and or procedures to assure that power is removed from the TO...

Страница 13: ...g mode prior to deployment 18 Secure Configuration Prior to configuration the Administrator must determine the appropriate key management mode for operation Selecting the mode impacts how the host sys...

Страница 14: ...lication c Require the ATA user password enables the KEK with BLACK key and ATA Password mode Set the ATA Password Length to 64 bytes d Enable the Secure Erase Trigger option e Select a Default Secure...

Страница 15: ...nce are listed below a KEK and BLACK DEK mode must be set to KEK and BLACK DEK b The Key Source selection is determined by the CO as required by the fielded application c Require the ATA user password...

Страница 16: ...the ATA password and issue the Get Drive Information command and verify that the TOE is in a CC compliant mode 21 Changing the User or Master ATA Password after the TOE is configured The TOE supports...

Страница 17: ...t 23 Installing the TOE into a host system ESD The ASURRE Stor SSD utilizes both active and passive techniques to mitigate damage caused by severe electro static discharge Mercury Systems recommends f...

Страница 18: ...SSD SATA Connector Warning The power segments of most commercial SATA connectors have every three pins shorted Refer to images in Figure 7 P1 P2 and P3 3 3V shorted P4 P5 and P6 GND shorted P7 P8 and...

Страница 19: ...oves the encrypted result to the NAND media The User Role after successful authentication can access previously encrypted data stored in the NAND media Prior to authentication the User Role cannot wri...

Страница 20: ...components in the TOE use production grade materials The printed circuit board is conformal coated and all BGA devices are under filled with a hard opaque epoxy to prevent easy probing of individual...

Страница 21: ...ion prevents an attacker from attempting to change to a different firmware version in the field The Crypto Officer shall enforce the use of 8 character minimum password lengths for the User ATA Passwo...

Страница 22: ...bel for signs of removal at least once per year While not intended as a tamper seal the label can be difficult to remove and can show signs of damage such as tearing discoloration or other damage if i...

Страница 23: ...ugust 16 2017 8 23 17 Modified per Evaluation findings Rev 1 5 1 Bob Laz Sabrina Pi a 8 21 2019 Updates for re certification Document Dates footers and cPP versions updated 11 25 2019 Updated Mercury...

Отзывы: