Secure Software for the Internet of Things

Allegro Software Expands FIPS 140-2 Support
For IoT Applications Needing Validated Cryptography in Military, Medical and Federal Environments

FIPS 140-2 validated cryptography specifically engineered for Military, Medical and Federal IoT applications

 

BOXBOROUGH, MA August 1, 2017 – Allegro Software, a leading supplier of Internet component software for the Internet of Things (IoT), today announced it has earned FIPS 140-2 level 1 validation on four additional platforms with the Allegro Cryptography Engine, ACETM from the U.S. government’s National Institute of Standards and Technology (NIST). This marks the culmination of Allegro’s largest validation effort to date with the U.S. government. Specifically engineered for the rigors of resource constrained IoT computing environments, ACE enables manufacturers to leverage standards-based cryptography in IoT environments with ease. ACE is ideally suited for use in embedded systems and IoT applications in the military, energy, medical and communications industries.

 

ACE AND FIPS 140-2 VALIDATION
Since the passage of the Federal Information Security Management Act (FISMA), Federal agencies and contractors have a mandate to maintain greater control over data and information systems as a whole. U.S. Federal agencies that use cryptographic-based systems to protect sensitive information in military, medical, telecommunications, IoT applications and other IT-related products must use FIPS 140-2 validated modules to meet these security requirements. FIPS 140-2 validation is also required by national agencies in Canada and is recognized in Europe and Australia.

 

ACE is one of the smallest, fastest, and most comprehensive FIPS 140-2 validated software modules on the market for IoT applications. Specifically engineered for the critical cryptographic computing needs of IoT applications, ACE is easily used, highly portable, and uniquely configurable to operate in the toughest resource sensitive environments. With a rich software API, IoT developers can easily perform bulk encryption and decryption, message digests, digital signature creation and validation, along with key generation and exchange. ACE also includes a platform independent implementation of NSA defined Suite B cryptographic algorithms as well as other FIPS approved algorithms. The FIPS approved algorithms are listed on the NIST CAVP sites along with the final validation designation on the NIST CVMP site.

 

To further aid developers implementing IoT security, ACE is pre-integrated with the full suite of Allegro AE IoT connectivity and security toolkits including RomSTL (TLS 1.2), RomCert (SCEP and OCSP), RomSShell AE (SSH), RomPager AE (web server) and RomWebClient AE (web client).

 

IoT SECURITY AND HARDWARE CRYPTOGRAPHIC ACCELERATION
IoT applications are engineered from the ground up for resource sensitive execution environments. Typically, the primary driving factor in these applications aims to deliver the highest value IoT product at the lowest cost. Unfortunately, implementing cryptographic security protocols in any environment is resource intensive in CPU, RAM and ROM which IoT devices often find difficult to support. To help address these needs, silicon manufacturers augment their chipsets with specifically engineered cryptographic engines to off-load resource intensive cryptographic calculations. Two of Allegro’s most recent FIPS 140-2 validated ACE modules have the flexibility to utilize on-board cryptographic acceleration when available. This greatly increases throughput while reducing the demand for CPU, RAM and ROM. These validations have been configured to support the on-board cryptographic acceleration from Intel (AES-NI) in addition to hardware based entropy to meet the latest NIST Implementation Guidance for FIPS modules.

 

“The need is critical for advanced security in IoT devices,” says Bob Van Andel, President of Allegro. “With the culmination of Allegro’s latest validations, IoT developers have access to the most essential component of seven key elements needed for proactive IoT security – highly portable, reliable, FIPS 140-2 validated cryptography.” ACE is delivered as an ANSI-C source code toolkit and is available now. To learn more about the “7 Key Elements for Proactive IoT Security” visit our website: https://www.allegrosoft.com/secure-iot. For additional information on Allegro Software and the full suite of Allegro AE IoT connectivity and security toolkits, visit our website: https://www.allegrosoft.com/iot-device-cybersecurity.

 

About Allegro
Allegro Software Development Corporation is a premier provider of embedded Internet software components with an emphasis on industry-leading device management, embedded device security, UPnP-DLNA networking, and the Internet of Things. Since 1996, Allegro has been on the forefront of leading the evolution of secure device management solutions with its RomPager embedded web server and security toolkits. Also an active contributor to UPnP and DLNA initiatives, Allegro supplies a range of UPnP and DLNA toolkits that offer portability, easy integration, and full compliance with UPnP and DLNA specifications. Allegro is headquartered in Boxborough, MA.

 

Contacts:
Loren Shade
VP Marketing
Allegro Software Development Corporation
978-264-6600
loren@allegrosoft.com

 

Embedded FIPS 140-2 Cryptography

FIPS 140-2 Level 2 Logo

The Allegro Cryptography Engine (ACE) is a platform independent, high performance, resource sensitive, embedded  FIPS 140-2 Validated cryptography engine specifically engineered for the rigors of embedded computing. ACE enables OEM manufacturers to add sophisticated FIPS approved encryption technology to their designs and dramatically speed the development cycle. The ACE cryptography library is designed to meet the requirements needed for FIPS 140-2 validation.

ACE

Embedded systems are appearing in virtually all industries with the capability to communicate independently. The rapid adoption and deployment of modern communication technologies have enabled new applications in healthcare, military applications, energy management, consumer devices and many other areas. With these capabilities, comes the need for embedded device security. Any network-enabled device must be considered as a potential target for malicious intent. Encryption of sensitive data while in motion or at rest is a key component to thwarting malicious attacks and reducing risk.

ACE is a cryptographic library module for embedded computing systems that provides validated software implementations of FIPS-approved algorithms for the calculation of message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange. Used stand-alone or pre-integrated with Allegro's Secure IoT Suite, ACE provides CAVP validated implementations of sophisticated FIPS approved encryption algorithms for use in embedded systems. In 2005, the National Security Agency (NSA) defined a set of cryptographic algorithms that when used together, are the preferred method for assuring the security and integrity of information passed over public networks such as the Internet. Today, Suite B is globally recognized as an advanced standard for cryptography that defines algorithms and strengths for encryption, hashing, calculating digital signatures and key exchange. ACE includes a platform independent, CAVP validated implementation of the NSA Suite B defined suite of cryptographic algorithms. ACE is delivered as ANSI C source.

Securing Data In Motion

Many IoT applications often collect and correlate valuable sensitive information at the edge of the Internet and routinely transmit it to servers in the cloud securely. TLS and DTLS are the “defacto” standards for keeping data secure when communicating with servers in the cloud. Allegro’s RomSTL, embedded TLS, and DTLS toolkit, tightly integrates FIPS validated cryptography with a standards-based, embedded implementation of TLS/DTLS to keep your data secure while in motion. RomTLS is additionally integrated to make use of ACE’s support of Suite B algorithms (RFC 6460).

Securing Data At Rest

Allegro’s secure data-at-rest solution is tightly integrated with ACE validated FIPS 140-2 cryptography. Before offloading data to cloud-based applications, any sensitive information stored by IoT devices faces numerous threats and risks of unintentional exposure. Adding data encryption to the transmission process has been the traditional method for reducing this risk. However, simply encrypting data transmissions doesn’t fully address many of the threats aimed at recovering small segments of data or potentially the entire collection. Allegro's Secure IoT Suite provides IoT design engineers the ability to proactively address the threat surface created when storing sensitive data on persistent media. Rather than encrypting data at a volume or drive level where exposing a single set of keys potentially compromises a significant amount of sensitive data, Allegro’s secure data-at-rest solution encrypts information at the file level.

ACE can be used stand-alone or pre-integrated with Allegro’s Secure IoT Suite.

TM: A Certification Mark of NIST, which does not imply product endorsement by NIST, the U.S. or Canadian Governments

ACE - FIPS Mode

 

Digital Signature Algorithms

  • RSA (FIPS 186-4) Key lengths: 2048, 3072
    • Padding Modes: ANSI X9.31, PKCS #1v1.5, PSS
  • DSA (FIPS 186-4) Key lengths: 2048, 3072
  • ECDSA (FIPS 186-4) Curves: NIST P-224, P-256, P-384, P-521

Symmetric Keys

  • AES Key lengths: 128, 192, 256
    • Modes: ECB, CBC, CTR, CFB1, CFB8, CFB128, OFB, CCM
  • AES-GCM Key lengths: 128, 192, 256
  • AES-XTS Key lengths: 128, 256
  • TripleDES
    • Modes: ECB, CBC, CFB1, CFB8, CFB64, OFB

Hash Functions

  • SHA-1
  • SHA-224
  • SHA-256
  • SHA-384
  • SHA-512
  • SHA3-224
  • SHA3-256
  • SHA3-384
  • SHA3-512

Message Authentication

  • HMAC-SHA-1
  • HMAC-SHA-224
  • HMAC-SHA-256
  • HMAC-SHA-384
  • HMAC-SHA-512
  • AES-GMAC Keylengths: 128, 192, 256
  • AES-CMAC Keylengths: 128, 192, 256

Key Agreement

  • DH (NIST SP 800-56A)
  • ECDH Curves: NIST P-224, P-256, P-384, P-521

Key Derivation

  • Password-Based Key Derivation Function 2 (PBKDF2)
  • TLS Key Derivation Functions

Random Number Generator

  • DRBG (NIST SP 800-90B)

 

ACE - Non-FIPS Mode

All of the above in addition to the following:

 

Digital Signature Algorithms

  • RSA: arbitrary key lengths 1024, 2048, 3072
  • DSA: arbitrary key lengths 1024, 2048, 3072

Symmetric Keys

  • DES
  • RC4

Hash Functions

  • MD2
  • MD4
  • MD5

Message Authentication

  • HMAC-MD5

 

 

Features

Benefits

Small code footprint

More resources available for application features

ANSI C Source Code Distribution

Broad processor architecture support, eases porting and support

Processor, RTOS and TCP/IP stack agnostic

Allegro's products will work with new or existing hardware and software designs

Flexible Security and External Security support

Use software encryption or if available make use of hardware cryptography acceleration

Compilation switches for size, feature and speed trade-offs

Allows the development team to optimize for system resources

Supported RFCs

System Requirements

  • Processor Architecture - Works with any 16-bit, 32-bit or 64-bit processor
  • Operating System(OS) - Works with any OS vendor and will function without an OS if needed
  • Compiler - ANSI C

NIST CVMP Validation Reference

FIPS 140-2 Level 2 Logo

Validated FIPS FIPS 140-2 Cryptographic Modules

 

Certificate Number Status NIST Link
3432 Active NIST Reference
2966 Active NIST Reference
2048 Historical NIST Reference

CAVP Validation References

 

AES Validation

Validation Number Date
AES 5574 7/27/2018
AES 5573 7/27/2018
AES 4121 10/14/2016
AES 2671 11/8/2013
AES 2314 1/18/2013
AES 2271 11/15/2012

 

DSA Validation

Validation Number Date
DSA 1116 10/14/2016
DSA 810 11/8/2013
DSA 728 1/18/2013
DSA 708 11/15/2012

 

RSA Validation

Validation Number Date
RSA 3000 7/27/2018
RSA 2999 7/27/2018
RSA 2227 10/14/2016
RSA 1374 11/8/2013
RSA 1197 1/8/2013
RSA 1164 11/15/2012

 

ECDSA Validation

Validation Number Date
ECDSA 1505 7/27/2018
ECDSA 1504 7/27/2018
ECDSA 936 10/14/2016
ECDSA 465 11/8/2013
ECDSA 379 1/18/2013
ECDSA 367 11/15/2012

 

Triple-DES

Validation Number Date
TDES 2251 10/14/2016
TDES 1602 11/8/2013
TDES 1459 1/18/2013
TDES 1418 11/15/2012

 

SHA Validation

Validation Number Date
SHS 4478 7/27/2018
SHS 4477 7/27/2018
SHS 3390 10/14/2016
SHS 2243 11/8/2013
SHS 1997 1/8/2013
SHS 1952 11/15/2012

 

ECC Component Validations

Validation Number Date
Component 2005 7/27/2018
Component 2004 7/27/2018
Component 927 10/14/2016
Component 148 11/8/2013
Component 50 1/8/2013
Component 43 11/15/2012

 

DRBG Validation

Validation Number Date
DRBG 2224 7/27/2018
DRBG 2223 7/27/2018
DRBG 1241 10/14/2016
DRBG 430 11/8/2013
DRBG 286 1/8/2013
DRBG 279 11/15/2012

 

SHAKE/SHA-3 Validation

Validation Number Date
SHA-3 8 7/27/2018

 

KDF TLS Validation

Validation Number Date
Component 2062 9/7/2018
Component 2061 9/7/2018
Component 1074 1/27/2017

 

KAS FFC Validation

Validation Number Date
Component 927 10/14/2016
Component 148 11/8/2013
Component 43 11/15/2012

 

KAS ECC Validation

Validation Number Date
Component 2005 7/27/2018
Component 2004 7/27/2018
Component 927 10/14/2016
Component 148 11/8/2013
Component 50 1/8/2013
Component 43 11/15/2012

 

HMAC SHA2 Validation

Validation Number Date
HMAC 3715 7/27/2018
HMAC 3714 7/27/2018
HMAC 2692 10/14/2016
HMAC 1661 11/8/2013
HMAC 1430 1/8/2013
HMAC 1390 11/15/2012

 

Allegro Software
1740 Massachusetts Avenue
Boxborough, MA 01719

Home | Resources | News/Events | Company | Contact | Legal

Copyright © 2019, Allegro Software Development Corporation
All Rights Reserved