140sp759 Icom Security Policy NTIA
140sp759 Icom Security Policy NTIA
140sp759 Icom Security Policy NTIA
Digital Unit
UT-120 #10 and #11 Cryptographic Module
Table of Contents
1. INTRODUCTION..................................................................................................... 3
1.1. PURPOSE............................................................................................................ 3
1.2. DIGITAL UNIT IMPLEMENTATION.................................................................. 3
1.3. CRYPTOGRAPHIC BOUNDARY........................................................................ 3
2. FIPS 140-2 SECURITY LEVEL............................................................................... 4
3. ROLES, SERVICES AND AUTHENTICATION.................................................... 4
3.1. ROLES................................................................................................................. 4
3.2. SERVICES........................................................................................................... 5
3.3. IDENTIFICATION AND AUTHENTICATION..................................................... 6
4. SECURE OPERATION AND RULES..................................................................... 7
4.1. SECURITY RULES.............................................................................................. 7
4.2. PHYSICAL SECURITY........................................................................................ 7
4.3. SECURE OPERATION INITIALIZATION........................................................... 7
5. ACCESS CONTROL POLICY................................................................................. 9
6. MITIGATION OF OTHER ATTACKS.................................................................... 10
Page 2 of 10
ICOM AMERICA, INC. Security Policy
1. Introduction
This document details the security policy for the Digital Unit UT-120 #10 and
#11 hardware version 1.1 implementing firmware Rev 3.0 version 2.8, herein
identified as the UT-120 #10 and UT-120 #11, employed in ICOM AMERICA, INC.
radios. This security policy may be freely reproduced and distributed only in its
entirety without revision.
1.1 Purpose
The secure operation of the UT-120 #10 or UT-120 #11 is detailed in this
document to include the requirements of FIPS 140-2 and those imposed by ICOM
AMERICA, INC. as applicable to the initialization, roles, and responsibilities of
security related data and components management.
The UT-120 #10 (or UT-120 #11) cryptographic boundary is the entire printed
circuit board as depicted in Figure 1.
Top Bottom
Figure 1
Page 3 of 10
ICOM AMERICA, INC. Security Policy
The UT-120 #10 and #11 meets the security requirements established in FIPS
140-2 for an overall module security of Level 1 with the individual requirements and
corresponding security level detailed in Table 1.
3.1 Roles
The UT-120 #10 and #11 supports the roles of Crypto Officer and User. Only one
role can exist at any one time as they are mutually exclusive.
Crypto Officer
Assumption of the Crypto Officer role is implied when any of the services
specific to a Crypto Officer are executed.
The Crypto Officer role is responsible for the keys and firmware of the UT-120
#10 and #11. The management of keys, such as loading, reading and writing, is the
domain of the Crypto Officer. The main tool for key management utilized by the
Crypto Officer is an approved key loading device.
The Crypto Officer role will also manage firmware updating and checking
procedures.
User
Assumption of the User role is implied when any of the services specific to a User
are executed.
Page 4 of 10
ICOM AMERICA, INC. Security Policy
The User role is primarily involved in the services which conduct the encryption
and decryption of communication, invoke self tests, and indicate the status of the UT-
120 #10 and #11.
Maintenance
Assumption of the Maintenance role is implied after the operator accesses the
module using the MD pin on the module’s PCB and performs the procedural
zeroization of the firmware and EEPROM contents.
3.2 Services
The security services and functions available in the UT-120 #10 and #11 along
with the applicable operator role for each service and function can be found in Table
2 below.
The UT-120 #10 and #11 supports the following approved security functions:
• AES (Cert. # 422)
• HMAC (Cert. # 197)
• SHA-1 (Cert. # 493)
The UT-120 #10 and #11 also supports the following non-approved security
functions:
• DES
• ANSI X9.31 PRNG
The AES On/Off service allows the operator to transition the module into a
Page 5 of 10
ICOM AMERICA, INC. Security Policy
bypass state. In this state, with AES off, the operator would be transmitting data in
the clear with no encryption. The module can be transitioned back to the encrypted
mode of operation by turning AES on again.
The UT-120 #10 and #11 performs a conditional bypass test for both the
transition into and the transition out of the bypass state.
Page 6 of 10
ICOM AMERICA, INC. Security Policy
This section details the security rules which should be enforced for the secure use
of the UT-120 #10 (or UT-120 #11) and the physical security employed.
The security rules presented below are those required by FIPS 140-2 for Level 1
secure use and the security rules separately implemented by ICOM AMERICA, INC.
The following rules are required to operate in accordance with FIPS 140-2:
The Maintenance role can only be used once, since the procedure for entering the
maintenance role effectively performs the zeroization of all CSPs including the
HMAC integrity load key. In order to recover from this state, the UT-120 #10 and
#11 must be returned to the manufacturer.
1. Attach the module to a general purpose computer using the ‘MD’ pin on the
module’s printed circuit board.
2. Zeroize the contents of the EEPROM and firmware
The UT-120 #10 and #11 are composed of production grade components which
do not require any maintenance or inspection by the user to insure security.
Page 7 of 10
ICOM AMERICA, INC. Security Policy
The UT-120 #10 (or UT-120 #11) has modes of operation which are not FIPS
140-2 approved. Therefore, the following set of configuration procedures and
parameters should be followed to use the UT-120 #10 in a FIPS 140-2 compliant
manner:
1. With the CS-F70 cloning software installed on your PC connect the radio and
PC together using an OPC-1122 cloning cable.
2. Turn on the encryption for the channels with which you will operate in a FIPS
140-2 approved mode by selecting the column labeled “Encryption” on the
software user interface.
3. Select the CKR (Common Key Reference) number corresponding to the FIPS
approved algorithm CKR on the key loading device.
4. Select the buttons you wish to assign the functions of encryption and zeroize
to. These functions are both FIPS 140-2 approved modes of operation.
5. Disconnect the OPC-1122 cable from the radio.
6. Turn the radio on.
7. Select the channel programmed with the FIPS 140-2 approved algorithms from
steps 2 and 3 above.
8. Press the button to which the encryption function was assigned.
9. The radio is now configured to operate in a FIPS 140-2 compliant manner.
The approved modes of operation available on the UT-120 #10 and #11 are AES-
256 bit for encryption and decryption and zeroize for clearing the AES key. All other
modes available are not FIPS 140-2 approved and therefore are not authorized when the
UT-120 #10 (or UT-120 #11) is to be employed in a manner compliant with FIPS 140-
2.
Page 8 of 10
ICOM AMERICA, INC. Security Policy
D = Delete
N = None
R = Read
S = Select
W = Write
Where each of the above references the type of access the service has to the listed
keys and Critical Security Parameters (CSP) on Table 3.
1
Traffic Encryption Key – The AES (approved) or DES (non-approved) key value used to perform
encryption and decryption.
Page 9 of 10
ICOM AMERICA, INC. Security Policy
The UT-120 #10 and #11 has not been designed to mitigate attacks outside of
those required within the FIPS 140-2 document.
Page 10 of 10