Trusted Platform Module 2.0 SLB 9672 FW 17.10, 17.12, 17.13 and SLB 9673 FW 27.10, 27.13

Certificate #4468

Webpage information ?

Status active
Validation dates 07.04.2023 , 30.08.2023
Sunset date 21-09-2026
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Single Chip
Caveat When operated in FIPS mode, initialized, and configured as specified in Sections 9.1 and 10 of the Security Policy
Exceptions
  • Physical Security: Level 3
  • EMI/EMC: Level 3
Description The TPM is a single chip module that provides computer manufacturers with the core components of a subsystem used to assure authenticity, integrity and confidentiality in e-commerce and internet communications within a Trusted Computing Platform. The TPM is a complete solution implementing the Trusted Platform Module Library Specification, Family "2.0", Level 00, Revision 01.59, November 8, 2019 (Parts 1-4), Errata Version 1.1. See http://www.trustedcomputinggroup.org for further information on TCG and TPM.
Version (Hardware) PNs SLB 9672AU20 (Package PG-UQFN-32-3) [1] and SLB 9673AU20 (Package PG-UQFN-32-3) [2]
Version (Firmware) 17.10.16488 [1], 17.12.16858 [1], 17.13.17733 [1], 27.10.16688 [2] and 27.13.17770 [2]
Vendor Infineon Technologies AG
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Document information ?

Security policy

Symmetric Algorithms
AES, AES-256, AES-128, AES-192, AES-, HMAC, HMAC-SHA-384, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, ECC, DH
Post-quantum Algorithms
XMSS
Hash functions
SHA-1, SHA-512, SHA-384, SHA-256
Schemes
Key Agreement
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-521, P-256, P-384, curve P-256, curve P-521, NIST P-521
Block cipher modes
ECB, CTR, CFB

Trusted Execution Environments
PSP
Vendor
Infineon Technologies AG, Infineon, Infineon Technologies

Security level
Level 2, Level 3
Side-channel analysis
Physical probing, physical tampering, Fault induction, fault induction
Certification process
out of scope, must be validated through the FIPS 140-2 CMVP. Any other firmware loaded into this module is out of scope of this validation and requires a separate FIPS 140-2 validation. © 2023 Infineon Technologies AG

Standards
FIPS 140, FIPS 140-2, FIPS 186-4, FIPS 180-4, FIPS 197, FIPS 198-1, FIPS PUB 140-2, SP 800-90B, SP 800-38A, SP 800-38F, SP 800-56A, PKCS #1

File metadata

Title: Trusted Platform Module 2.0 SLB 9672 FW17.10 and SLB 9673 FW27.10
Author: Schuch Sven (IFAG DSS ESS D SW A)
Creation date: D:20230710164511-07'00'
Modification date: D:20230710164856-07'00'
Pages: 36
Creator: Acrobat PDFMaker 23 for Word
Producer: Adobe PDF Library 23.3.247

References

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 18.09.2023 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The module_name property was set to Trusted Platform Module 2.0 SLB 9672 FW 17.10, 17.12, 17.13 and SLB 9673 FW 27.10, 27.13.
    • The validation_history property was updated, with the [[1, {'_type': 'sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry', 'date': '2023-08-30', 'validation_type': 'Update', 'lab': 'UL VERIFICATION SERVICES INC'}]] values inserted.
    • The fw_versions property was set to 17.10.16488 [1], 17.12.16858 [1], 17.13.17733 [1], 27.10.16688 [2] and 27.13.17770 [2].

    The PDF extraction data was updated.

    • The keywords property was updated, with the {'fips_security_level': {'__update__': {'Level': {'__update__': {'Level 2': 33}}}}, 'fips_certlike': {'__update__': {'Certlike': {'__insert__': {'HMAC- SHA-384 128': 1, 'PKCS1-V1_5': 3, 'AES-256 256': 1}, '__update__': {'HMAC-SHA-256': 14, 'HMAC-SHA- 256': 6, 'SHA-384': 11, 'SHA-256': 13}, '__delete__': ['HMAC-SHA-384 128', 'SHA- 384', 'AES- 256 256']}}}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 37}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES-': 1, 'AES-256': 5}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC-SHA-256': 7, 'HMAC-SHA-384': 10}}}}}}, 'pq_crypto': {'XMSS': {'XMSS': 2}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-384': 11, 'SHA-256': 13}}}}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140': 32}}}}} data.
    • The policy_metadata property was updated, with the {'pdf_file_size_bytes': 763582, '/Creator': 'Acrobat PDFMaker 23 for Word', '/CreationDate': "D:20230710164511-07'00'", '/ModDate': "D:20230710164856-07'00'", '/Producer': 'Adobe PDF Library 23.3.247', 'pdf_hyperlinks': {'__add__': {'_type': 'Set', 'elements': ['https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36346', 'https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36348']}}} data.

    The computed heuristics were updated.

    • The algorithms property was updated, with the {'_type': 'Set', 'elements': ['KTS#A3738', 'KBKDF#A3736', 'CVL#A3736', 'KAS-SSC#A3736', 'DRBG#A3736', 'CVL#A3738', 'ECDSA#A3736', 'AES#A3738', 'AES#A3736', 'HMAC#A3738', 'KTS-RSA#A3736', 'KAS-SSC#A3738', 'HMAC#A3736', 'KAS#A3736', 'RSA#A3736', 'KTS-RSA#A3738', 'DRBG#A3738', 'RSA#A3738', 'SHS#A3738', 'KBKDF#A3738', 'ECDSA#A3738', 'KAS#A3738', 'KTS#A3736', 'SHS#A3736']} values added.
    • The extracted_versions property was updated, with the {'_type': 'Set', 'elements': ['17.13', '17.13.17733', '27.13', '27.13.17770']} values added.

    The state was updated.

    • The policy_pdf_hash property was set to d3460e9606a337439bd59afeb4bdaf3eadacb8ba87240a8e7a5636aafd76d6ff.
    • The policy_txt_hash property was set to 28b294ff3500ae34adf285ccf4e3d0c1bdc64842cb96882ad82301303bf0b3fd.
  • 18.05.2023 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4468,
  "dgst": "dc99a69a88c91874",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KTS-RSA#A3738",
        "HMAC#A2072",
        "DRBG#A1718",
        "RSA#A2072",
        "SHS#A2072",
        "AES#A3736",
        "KTS#A1718",
        "SHS#A3736",
        "KBKDF#A3738",
        "AES#A2588",
        "KAS-SSC#A2588",
        "KAS-SSC#A1718",
        "HMAC#A3736",
        "RSA#A2588",
        "KAS-SSC#A2072",
        "AES#A2072",
        "KBKDF#A2072",
        "KAS#A1718",
        "KAS#A2072",
        "DRBG#A3738",
        "KTS#A3738",
        "CVL#A3738",
        "HMAC#A1718",
        "RSA#A3738",
        "CVL#A2588",
        "KAS-SSC#A3736",
        "CVL#A1718",
        "AES#A3738",
        "KTS-RSA#A1718",
        "KTS-RSA#A2588",
        "DRBG#A2588",
        "RSA#A3736",
        "SHS#A2588",
        "DRBG#A2072",
        "KAS#A2588",
        "KBKDF#A3736",
        "HMAC#A3738",
        "KTS#A2072",
        "ECDSA#A2588",
        "HMAC#A2588",
        "KTS#A2588",
        "KTS-RSA#A3736",
        "SHS#A3738",
        "SHS#A1718",
        "RSA#A1718",
        "ECDSA#A1718",
        "KBKDF#A2588",
        "ECDSA#A3738",
        "AES#A1718",
        "ECDSA#A2072",
        "ECDSA#A3736",
        "KAS-SSC#A3738",
        "KAS#A3736",
        "KTS-RSA#A2072",
        "KAS#A3738",
        "DRBG#A3736",
        "CVL#A3736",
        "KTS#A3736",
        "KBKDF#A1718",
        "CVL#A2072"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "27.13",
        "17.10.16488",
        "17.12.16858",
        "27.10.16688",
        "17.13.17733",
        "17.12",
        "17.13",
        "27.10",
        "27.13.17770",
        "17.10",
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 38
          },
          "ECDSA": {
            "ECDSA": 15
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        }
      },
      "certification_process": {
        "OutOfScope": {
          "must be validated through the FIPS 140-2 CMVP. Any other firmware loaded into this module is out of scope of this validation and requires a separate FIPS 140-2 validation. \u00a9 2023 Infineon Technologies AG": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CFB": {
          "CFB": 4
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 12
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-521": 1,
          "P-256": 32,
          "P-384": 22,
          "P-521": 4,
          "curve P-256": 2,
          "curve P-521": 1
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 256": 1,
          "AES Encrypt/Decrypt2": 1,
          "AES- 256": 1,
          "AES-128": 6,
          "AES-192": 3,
          "AES-256": 4,
          "AES-256 256": 1,
          "HMAC SHA-256": 2,
          "HMAC- SHA-1": 2,
          "HMAC- SHA-384": 1,
          "HMAC- SHA-384 128": 1,
          "HMAC-SHA- 256": 6,
          "HMAC-SHA-1": 14,
          "HMAC-SHA-256": 14,
          "HMAC-SHA-384": 16,
          "HMAC-SHA-384 160": 4,
          "PKCS #1": 2,
          "PKCS1-V1_5": 3,
          "RSASSA-PKCS1-V1_5": 1,
          "SHA- 1": 1,
          "SHA-1": 9,
          "SHA-1 3": 1,
          "SHA-256": 13,
          "SHA-384": 11,
          "SHA-512": 8
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 33,
          "Level 3": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 10
          },
          "SHA2": {
            "SHA-256": 13,
            "SHA-384": 11,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "XMSS": {
          "XMSS": 2
        }
      },
      "randomness": {
        "PRNG": {
          "DRBG": 11
        },
        "RNG": {
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault induction": 1,
          "fault induction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "Physical probing": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 32,
          "FIPS 140-2": 11,
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 3,
          "FIPS 198-1": 2,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-38A": 1,
          "SP 800-38F": 1,
          "SP 800-56A": 1,
          "SP 800-90B": 1
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24,
            "AES-": 1,
            "AES-128": 6,
            "AES-192": 3,
            "AES-256": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 39,
            "HMAC-SHA-256": 7,
            "HMAC-SHA-384": 10
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 9,
          "Infineon Technologies": 6,
          "Infineon Technologies AG": 37
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/AdditionalMarking": "",
      "/Author": "Schuch Sven (IFAG DSS ESS D SW A)",
      "/Company": "Infineon Technologies",
      "/ConfidentialityMarking": "public",
      "/ContentTypeId": "0x0101002603A8BD598079408FAFB6A65885BDDD",
      "/CreationDate": "D:20230710164511-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 for Word",
      "/Doc_Number": "",
      "/Doc_Reference": "",
      "/Doc_Type": "Release",
      "/DocumentDepartment": "IFAG CSS ESS D SW A",
      "/DocumentID": "",
      "/DocumentIssueDate": "2023-06-28",
      "/DocumentLanguage": "DocumentLanguage",
      "/DocumentOfficeLocation": "",
      "/DocumentShowDate": "True",
      "/DocumentStatus": "DocumentStatus",
      "/DocumentVersion": " 1.3",
      "/ModDate": "D:20230710164856-07\u002700\u0027",
      "/Owner": "Schuch Sven (IFAG CSS ESS D SW A)",
      "/Producer": "Adobe PDF Library 23.3.247",
      "/Product_SalesCode": "Product_SalesCode",
      "/Product_SalesCode_1": "Product_SalesCode_1",
      "/Product_SalesCode_2": "Product_SalesCode_2",
      "/Product_SalesCode_3": "Product_SalesCode_3",
      "/Product_SalesCode_4": "Product_SalesCode_4",
      "/Product_Version": "Product_Version",
      "/Proprietary": "",
      "/QualityReqCat": "\u003cQuality-requirement-category\u003e",
      "/SourceModified": "D:20230710234436",
      "/TemplateCompany": "IFX",
      "/TemplateVersion": "TemplateVersion",
      "/Title": "Trusted Platform Module 2.0 SLB 9672 FW17.10 and SLB 9673 FW27.10",
      "/Title_continued": "FIPS 140 2 Level 2 Non-Proprietary Security Policy",
      "/URL": "www.infineon.com",
      "pdf_file_size_bytes": 763582,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36348",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34683",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35199",
          "mailto:dsscustomerservice@infineon.com",
          "http://www.infineon.com/",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34327",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=36346",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34681",
          "http://www.trustedcomputinggroup.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "d3460e9606a337439bd59afeb4bdaf3eadacb8ba87240a8e7a5636aafd76d6ff",
    "policy_txt_hash": "28b294ff3500ae34adf285ccf4e3d0c1bdc64842cb96882ad82301303bf0b3fd"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode, initialized, and configured as specified in Sections 9.1 and 10 of the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/April 2023_010523_0646.pdf",
    "date_sunset": "2026-09-21",
    "description": "The TPM is a single chip module that provides computer manufacturers with the core components of a subsystem used to assure authenticity, integrity and confidentiality in e-commerce and internet communications within a Trusted Computing Platform. The TPM is a complete solution implementing the Trusted Platform Module Library Specification, Family \"2.0\", Level 00, Revision 01.59, November 8, 2019 (Parts 1-4), Errata Version 1.1. See http://www.trustedcomputinggroup.org for further information on TCG and TPM.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Physical Security: Level 3",
      "EMI/EMC: Level 3"
    ],
    "fw_versions": "17.10.16488 [1], 17.12.16858 [1], 17.13.17733 [1], 27.10.16688 [2] and 27.13.17770 [2]",
    "historical_reason": null,
    "hw_versions": "PNs SLB 9672AU20 (Package PG-UQFN-32-3) [1] and SLB 9673AU20 (Package PG-UQFN-32-3) [2]",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Trusted Platform Module 2.0 SLB 9672 FW 17.10, 17.12, 17.13 and SLB 9673 FW 27.10, 27.13",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-04-07",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2023-08-30",
        "lab": "UL VERIFICATION SERVICES INC",
        "validation_type": "Update"
      }
    ],
    "vendor": "Infineon Technologies AG",
    "vendor_url": "http://www.infineon.com"
  }
}