This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

CC2642R: Crypto Validation / Robustness

Genius 17335 points

Part Number: CC2642R

Hi all

I have the following question for the CC2642R:

Can you specify how the crypto module has been validated ?

Are there any validation standards to prove the robustness and reliability of such security modules ?

=> Please share any documentation you have for this topic.

Best regards

Ueli

  • Hello Ueli,

    I am working to find the appropriate expert to help you. This may take some time to reach the right person depending on availability. Please expect an update by Tuesday. I appreciate your patience.

    Regards,
    Alexis
  • Hi Ueli,

    EIP-120t is self certified from the vendor, but it has been tested and validated by us and Inside Secure.

    In the EIP-120t Hardware Reference and Programmer Manual, Inside Secure claims compliance with the following:

    A.3 Compliances
    The list of EIP-120t features that operate in compliance with the standards that includes but is not limited to:
    1) AES encryption in ECB and CBC modes (FIPS-197)
    2) MD-5 and SHA-1 Hashing with HMAC (RFC 1321, RFC 2104, FIPS 180-1)
    3) MD-5, SHA-1 and SHA-2 Hashing with HMAC (RFC 1321, RFC 2104, FIPS 180-1, FIPS 180-2)
    4) Tightly Coupled Memory (TCM) Interface as specified in “ARM926EJ-S Technical Reference Manual. Rev 2.0”, by ARM
    5) NIST Special Publication 800-38A. Recommendation for Block Cipher Modes of Operation.
    6) NIST Special Publication 800-38D. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC

    The EIP-150 Verification Spec has the following:
    A.2 Standards
    The list of open standards, Internet Engineering Task Force (IETF) and National Institute of Standards and Technology (NIST) standards implemented in the EIP-150 includes but is not limited to:
    [1] Certicom Research. Standards For Efficient Cryptography Section 2: "Recommended Elliptic Curve Domain Parameters", Certicom Corp, September 20, 2000.



    Thanks,
    Alexis
  • Hello Alexis

    Thank you for the detialed feedback.

    Best regards

    Ueli