Trusted Platform Module 2.0 SLB 9672 FW 16.10, 16.12, 16.13 and SLB 9673 FW 26.10, 26.13

Certificate #4467

Webpage information ?

Status active
Validation dates 07.04.2023 , 30.08.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Single Chip
Caveat When operated in FIPS mode, initialized, and configured as specified in Sections 9.1 and 10 of the Security Policy
Exceptions
  • Physical Security: Level 3
  • EMI/EMC: Level 3
Description The TPM is a single chip module that provides computer manufacturers with the core components of a subsystem used to assure authenticity, integrity and confidentiality in e-commerce and internet communications within a Trusted Computing Platform. The TPM is a complete solution implementing the Trusted Platform Module Library Specification, Family "2.0", Level 00, Revision 01.59, November 8, 2019 (Parts 1-4), Errata Version 1.1. See www.trustedcomputinggroup.org for further information on TCG and TPM.
Version (Hardware) P/Ns SLB 9672AU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [1], SLB 9672XU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [1], SLB 9673AU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [2] and SLB 9673XU20 (Package PG-UQFN-32- or PG-UQFN-32-2) [2]
Version (Firmware) 16.10.16488 [1], 16.12.16858 [1], 16.13.17733 [1], 26.10.16688 [2] and 26.13.17770 [2]
Vendor Infineon Technologies AG
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Document information ?

Security policy

Symmetric Algorithms
AES, AES-256, AES-128, AES-192, HMAC, HMAC-SHA-384, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC, DH
Post-quantum Algorithms
XMSS
Hash functions
SHA-1, SHA-512, SHA-384, SHA-256
Schemes
Key Agreement
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-521, P-256, P-384, curve P-256, curve P-521, NIST P-521
Block cipher modes
ECB, CTR, CFB

Trusted Execution Environments
PSP
Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
Level 2, Level 3
Side-channel analysis
Physical probing, physical tampering, Fault induction, fault induction
Certification process
out of scope, must be validated through the FIPS 140-2 CMVP. Any other firmware loaded into this module is out of scope of this validation and requires a separate FIPS 140-2 validation. 2.4 TPM Composition Figure 5 and

Standards
FIPS 140, FIPS 140-2, FIPS 186-4, FIPS 180-4, FIPS 197, FIPS 198-1, FIPS PUB 140-2, SP 800-90B, SP 800-38A, SP 800-38F, SP 800-56A, PKCS #1

File metadata

Title: Trusted Platform Module 2.0 SLB 9672 FW17.10 and SLB 9672 FW27.10
Author: Schuch Sven (IFAG DSS ESS D SW A)
Creation date: D:20230710171306-07'00'
Modification date: D:20230710171613-07'00'
Pages: 37
Creator: Acrobat PDFMaker 23 for Word
Producer: Adobe PDF Library 23.3.247

References

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 18.09.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The module_name property was set to Trusted Platform Module 2.0 SLB 9672 FW 16.10, 16.12, 16.13 and SLB 9673 FW 26.10, 26.13.
    • The validation_history property was updated, with the [[1, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2023-08-30', 'validation_type': 'Update', 'lab': 'UL VERIFICATION SERVICES INC'}]] values inserted.
    • The fw_versions property was set to 16.10.16488 [1], 16.12.16858 [1], 16.13.17733 [1], 26.10.16688 [2] and 26.13.17770 [2].

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_security_level': {'__update__': {'Level': {'__update__': {'Level 2': 34}}}}, 'fips_certlike': {'__update__': {'Certlike': {'__insert__': {'HMAC-SHA-384 160': 4, 'HMAC- SHA-384': 1, 'SHA- 256': 1}, '__update__': {'HMAC-SHA-1': 18, 'HMAC- SHA-256': 2, 'HMAC-SHA- 256': 4, 'HMAC-SHA-384': 16, 'SHA-384': 9, 'SHA-256': 14, 'SHA-1': 8, 'SHA- 384': 1, 'PKCS1-V1_5': 3}, '__delete__': ['HMAC-SHA- 384 160', 'HMAC- SHA-1', 'SHA- 1']}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 38}}}}, 'symmetric_crypto': {'__update__': {'constructions': {'__update__': {'MAC': {'__update__': {'HMAC-SHA-384': 11}}}}}}, 'pq_crypto': {'XMSS': {'XMSS': 2}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 9}}, 'SHA2': {'__update__': {'SHA-384': 9, 'SHA-256': 14}}}}}}, 'ecc_curve': {'__update__': {'NIST': {'__update__': {'P-521': 4, 'P-384': 22, 'NIST P-521': 1}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140': 33}}}}} data.
    • The policy_metadata property was updated, with the {'pdf_file_size_bytes': 823431, '/Creator': 'Acrobat PDFMaker 23 for Word', '/CreationDate': "D:20230710171306-07'00'", '/ModDate': "D:20230710171613-07'00'", '/Producer': 'Adobe PDF Library 23.3.247', 'pdf_hyperlinks': {'__add__': {'_type': 'Set', 'elements': ['https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36345', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36347']}}} data.

    The computed heuristics were updated.

    • The algorithms property was updated, with the {'_type': 'Set', 'elements': ['KBKDF#A3735', 'HMAC#A3737', 'CVL#A3737', 'HMAC#A3735', 'CVL#A3735', 'KAS#A3735', 'ECDSA#A3737', 'SHS#A3735', 'KTS-RSA#A3737', 'AES#A3737', 'KTS-RSA#A3735', 'KAS-SSC#A3735', 'RSA#A3735', 'DRBG#A3735', 'KAS-SSC#A3737', 'KBKDF#A3737', 'KTS#A3737', 'KAS#A3737', 'KTS#A3735', 'RSA#A3737', 'AES#A3735', 'DRBG#A3737', 'ECDSA#A3735', 'SHS#A3737']} values added.
    • The extracted_versions property was updated, with the {'_type': 'Set', 'elements': ['16.13.17733', '26.13.17770', '26.13', '16.13']} values added.

    The state was updated.

    • The policy_pdf_hash property was set to 3f93ce32734dcd6cbb068105cc3aa4a2343e91af8ea45b860c6c368fd7375d7d.
    • The policy_txt_hash property was set to 932537e2775e0ac45a8570aef7744ba34b86d850544ea94b668cdc075746bbf6.
  • 18.05.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4467,
  "dgst": "63b0155fe5f82cce",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#A3737",
        "AES#A2587",
        "HMAC#A3735",
        "ECDSA#A3737",
        "KAS#A2073",
        "KAS-SSC#A1703",
        "RSA#A3735",
        "HMAC#A2073",
        "AES#A2073",
        "KAS#A3737",
        "KAS-SSC#A2587",
        "ECDSA#A2587",
        "DRBG#A1703",
        "HMAC#A3737",
        "HMAC#A2587",
        "KTS-RSA#A3735",
        "KTS#A2587",
        "RSA#A2587",
        "CVL#A1703",
        "KBKDF#A2587",
        "KTS#A3737",
        "KAS-SSC#A3735",
        "KBKDF#A1703",
        "RSA#A3737",
        "SHS#A1703",
        "KAS-SSC#A2073",
        "KTS#A3735",
        "HMAC#A1703",
        "ECDSA#A3735",
        "DRBG#A2587",
        "AES#A3735",
        "SHS#A2587",
        "SHS#A3735",
        "SHS#A3737",
        "KBKDF#A2073",
        "SHS#A2073",
        "DRBG#A3737",
        "CVL#A3735",
        "KBKDF#A3737",
        "KAS#A1703",
        "AES#A3737",
        "CVL#A2587",
        "KTS#A1703",
        "KTS-RSA#A1703",
        "KAS#A2587",
        "KAS#A3735",
        "KBKDF#A3735",
        "DRBG#A3735",
        "KAS-SSC#A3737",
        "RSA#A1703",
        "RSA#A2073",
        "CVL#A2073",
        "KTS-RSA#A2073",
        "DRBG#A2073",
        "AES#A1703",
        "ECDSA#A1703",
        "KTS-RSA#A3737",
        "KTS-RSA#A2587",
        "ECDSA#A2073",
        "KTS#A2073"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16.12.16858",
        "16.10.16488",
        "26.13.17770",
        "26.13",
        "16.13.17733",
        "16.12",
        "2.0",
        "26.10",
        "16.13",
        "16.10",
        "26.10.16688"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 38
          },
          "ECDSA": {
            "ECDSA": 15
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        }
      },
      "certification_process": {
        "OutOfScope": {
          "must be validated through the FIPS 140-2 CMVP. Any other firmware loaded into this module is out of scope of this validation and requires a separate FIPS 140-2 validation. 2.4 TPM Composition Figure 5 and": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 12
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-521": 1,
          "P-256": 32,
          "P-384": 22,
          "P-521": 4,
          "curve P-256": 2,
          "curve P-521": 1
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 256": 1,
          "AES Encrypt/Decrypt2": 1,
          "AES-128": 6,
          "AES-192": 3,
          "AES-256": 5,
          "AES-256 256": 1,
          "HMAC SHA-256": 2,
          "HMAC- SHA-256": 2,
          "HMAC- SHA-384": 1,
          "HMAC-SHA- 256": 4,
          "HMAC-SHA-1": 18,
          "HMAC-SHA-256": 12,
          "HMAC-SHA-384": 16,
          "HMAC-SHA-384 128": 2,
          "HMAC-SHA-384 160": 4,
          "PKCS #1": 2,
          "PKCS1-V1_5": 3,
          "RSASSA-PKCS1-V1_5": 1,
          "SHA- 256": 1,
          "SHA- 384": 1,
          "SHA-1": 8,
          "SHA-1 3": 1,
          "SHA-256": 14,
          "SHA-384": 9,
          "SHA-512": 8
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 34,
          "Level 3": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          },
          "SHA2": {
            "SHA-256": 14,
            "SHA-384": 9,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "XMSS": {
          "XMSS": 2
        }
      },
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault induction": 1,
          "fault induction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Physical probing": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 33,
          "FIPS 140-2": 11,
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 3,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-38A": 1,
          "SP 800-38F": 1,
          "SP 800-56A": 1,
          "SP 800-90B": 1
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24,
            "AES-128": 6,
            "AES-192": 3,
            "AES-256": 6
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 39,
            "HMAC-SHA-256": 6,
            "HMAC-SHA-384": 11
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 9,
          "Infineon Technologies": 6,
          "Infineon Technologies AG": 38
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/AdditionalMarking": "",
      "/Author": "Schuch Sven (IFAG DSS ESS D SW A)",
      "/Company": "Infineon Technologies",
      "/ConfidentialityMarking": "public",
      "/ContentTypeId": "0x0101002603A8BD598079408FAFB6A65885BDDD",
      "/CreationDate": "D:20230710171306-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 for Word",
      "/Doc_Number": "",
      "/Doc_Reference": "",
      "/Doc_Type": "Release",
      "/DocumentDepartment": "IFAG CSS ESS D SW A",
      "/DocumentID": "",
      "/DocumentIssueDate": "2023-06-28",
      "/DocumentLanguage": "DocumentLanguage",
      "/DocumentOfficeLocation": "",
      "/DocumentShowDate": "True",
      "/DocumentStatus": "DocumentStatus",
      "/DocumentVersion": " 1.3",
      "/ModDate": "D:20230710171613-07\u002700\u0027",
      "/Owner": "Schuch Sven (IFAG CSS ESS D SW A)",
      "/Producer": "Adobe PDF Library 23.3.247",
      "/Product_SalesCode": "Product_SalesCode",
      "/Product_SalesCode_1": "Product_SalesCode_1",
      "/Product_SalesCode_2": "Product_SalesCode_2",
      "/Product_SalesCode_3": "Product_SalesCode_3",
      "/Product_SalesCode_4": "Product_SalesCode_4",
      "/Product_Version": "Product_Version",
      "/Proprietary": "",
      "/QualityReqCat": "\u003cQuality-requirement-category\u003e",
      "/SourceModified": "D:20230711001225",
      "/TemplateCompany": "IFX",
      "/TemplateVersion": "TemplateVersion",
      "/Title": "Trusted Platform Module 2.0 SLB 9672 FW17.10 and SLB 9672 FW27.10",
      "/Title_continued": "FIPS 140 2 Level 2 Non-Proprietary Security Policy",
      "/URL": "www.infineon.com",
      "pdf_file_size_bytes": 823431,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34312",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34682",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35198",
          "mailto:dsscustomerservice@infineon.com",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36347",
          "http://www.infineon.com/",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36345",
          "http://www.trustedcomputinggroup.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "3f93ce32734dcd6cbb068105cc3aa4a2343e91af8ea45b860c6c368fd7375d7d",
    "policy_txt_hash": "932537e2775e0ac45a8570aef7744ba34b86d850544ea94b668cdc075746bbf6"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode, initialized, and configured as specified in Sections 9.1 and 10 of the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2023_010523_0646.pdf",
    "date_sunset": "2026-09-21",
    "description": "The TPM is a single chip module that provides computer manufacturers with the core components of a subsystem used to assure authenticity, integrity and confidentiality in e-commerce and internet communications within a Trusted Computing Platform. The TPM is a complete solution implementing the Trusted Platform Module Library Specification, Family \"2.0\", Level 00, Revision 01.59, November 8, 2019 (Parts 1-4), Errata Version 1.1. See www.trustedcomputinggroup.org for further information on TCG and TPM.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Physical Security: Level 3",
      "EMI/EMC: Level 3"
    ],
    "fw_versions": "16.10.16488 [1], 16.12.16858 [1], 16.13.17733 [1], 26.10.16688 [2] and 26.13.17770 [2]",
    "historical_reason": null,
    "hw_versions": "P/Ns SLB 9672AU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [1], SLB 9672XU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [1], SLB 9673AU20 (Package PG-UQFN-32-1 or PG-UQFN-32-2) [2] and SLB 9673XU20 (Package PG-UQFN-32- or PG-UQFN-32-2) [2]",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Trusted Platform Module 2.0 SLB 9672 FW 16.10, 16.12, 16.13 and SLB 9673 FW 26.10, 26.13",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-04-07",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-08-30",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Update"
      }
    ],
    "vendor": "Infineon Technologies AG",
    "vendor_url": "http://www.infineon.com"
  }
}