Samsung SAS 12G TCG Enterprise SSC SEDs PM1633a Series Security Policy
This non-proprietary Security Policy may only be copied in its entirety without alterations including this statement. Samsung copyright 2016.
Page 11 of 19
The cryptographic module shall enforce role-based authentication for
security relevant services.
The cryptographic module shall enforce a limited operational environment
by the secure firmware load test using ECDSA P-224 with SHA-256.
The cryptographic module shall provide a production-grade, opaque, and
tamper-evident cryptographic boundary.
The cryptographic module enters the error state upon failure of Self-tests.
All commands from the Host (General Purpose Computer (GPC) outside the
cryptographic boundary) are rejected in the error state and the cryptographic
module returns an error code (0x91) via the status output. Cryptographic
services and data output are explicitly inhibited when in the error state.
The cryptographic module satisfies the requirements of FIPS 140-2 IG A.9
(i.e. key_1
≠
key_2)
The module generates at a minimum 256 bits of entropy for use in key
generation.
Power-on Self-tests
Algorithm
Test
AES
Encrypt KAT and Decrypt KAT for AES-256-XTS at power-on
SHS
KAT for SHA-256 at power-on
DRBG
KAT for CTR_DRBG at power-on
ECDSA
KAT for ECDSA P-224 SHA-256 signature verification at
power-on
Exhibit 9 – Power-on Self-tests.
F/W integrity check
o
F/W integrity check is performed by using 212 bit error detection
code at power-on
Conditional Self-test
o
Pairwise consistency: N/A
o
Bypass Test: N/A
o
Manual key entry test: N/A
o
F/W load test
F/W load test is performed by using ECDSA algorithm with P-
224 and SHA-256
o
Continuous random number generator test on Approved DRBG
o
Continuous random number generator test on NDRNG