NIAP: Compliant Product
NIAP/CCEVS
  NIAP  »»  Product Compliant List  »»  Compliant Product  
Compliant Product - Samsung Knox File Encryption 1.3

Certificate Date:  2021.06.01

Validation Report Number:  CCEVS-VR-VID11161-2021

Product Type:    Application Software

Conformance Claim:  Protection Profile Compliant

PP Identifier:    PP-Module for File Encryption Version 1.0
  Protection Profile for Application Software Version 1.3

CC Testing Lab:  Gossamer Security Solutions


CC Certificate [PDF] Security Target [PDF] Validation Report [PDF]

Assurance Activity [PDF]

Administrative Guide [PDF]


Product Description

The Target of Evaluation (TOE) is Samsung Knox File Encryption 1.3. The TOE is a service built into the Knox work profile that can provide an additional layer of file encryption when a work profile is created with File Encryption enabled. This is available on devices that launch with Android 11 and Knox 3.7.

The Knox File Encryption service runs in the background and utilizes Samsung Android cryptographic modules to provide file encryption services for the Knox work profile. The service is designed to run without any user intervention as all files in the Knox work profile will be encrypted automatically


Evaluated Configuration

The evaluated configuration consists of Samsung Knox File Encryption 1.3 (the version is listed as “DualDAR”) on the following devices:

Device Name

Model
Number

Chipset Vendor

CPU

Android
Version

TEE OS

Knox Version

DualDAR Version

Galaxy S21 Ultra 5G

SM-G998B

Samsung

Exynos 2100

11

TEEGRIS 4.2

3.7

1.3.0

Galaxy S21 Ultra 5G

SM-G998U

Qualcomm

Snapdragon 888

11

QSEE 5.11

3.7

1.3.0

Galaxy S20+

SM-G986B

Samsung

Exynos 990

11

TEEGRIS 4.1

3.7

1.3.0

Galaxy S20+

SM-G986U

Qualcomm

Snapdragon 865

11

QSEE 5.8

3.7

1.3.0

Galaxy S10e

SM-G970F

Samsung

Exynos 9820

11

TEEGRIS 3.1

3.7

1.3.0

Galaxy S10+

SM-G975U

Qualcomm

Snapdragon 855

11

QSEE 5.2

3.7

1.3.0

Galaxy Tab Active3

SM-T575

Samsung

Exynos 9810

11

TEEGRIS 4.0

3.7

1.3.0

Table 1 - Evaluated Devices

In addition to the evaluated devices, the following device models are claimed as equivalent with a note about the differences between the evaluated device and the equivalent models.

Evaluated Device

CPU

Equivalent Devices

Differences

Galaxy S21 Ultra (Samsung)

Exynos 2100

Galaxy S21+ (Samsung)

Galaxy S21 (Samsung)

·   All devices have same software environments (Android, Kernel, TEE)

Galaxy S21 Ultra (Qualcomm)

Snapdragon 888

Galaxy S21+ (Qualcomm)

Galaxy S21 (Qualcomm)

·   All devices have same software environments (Android, Kernel, TEE)

Galaxy S20+ (Samsung)

Exynos 990

Galaxy S20 Ultra (Samsung)

Galaxy S20 (Samsung)

Galaxy Note20 Ultra 5G/LTE (Samsung)

Galaxy Note20 5G/LTE (Samsung)

·   All devices have same software environments (Android, Kernel, TEE)

Galaxy S20+ (Qualcomm)

Snapdragon 865

Galaxy S20 Ultra (Qualcomm)

Galaxy S20 (Qualcomm)

Galaxy S20 TE (Qualcomm)

Galaxy Note20 Ultra 5G (Qualcomm)

Galaxy Note20 5G (Qualcomm)

Galaxy Tab S7+

Galaxy Tab S7

·   All devices have same software environments (Android, Kernel, TEE)

Galaxy S10e (Samsung)

Exynos 9820

Galaxy S10+ (Samsung)

Galaxy S10 5G (Samsung)

Galaxy S10 (Samsung)

Galaxy Note10+ 5G (Samsung)

Galaxy Note10+ (Samsung)

Galaxy Note10 5G (Samsung)

·   All devices have same software environments (Android, Kernel, TEE)

·   Note10 (Samsung) devices have Exynos 9825 CPU

Galaxy S10+ (Qualcomm)

Snapdragon 855

Galaxy S10 5G (Qualcomm)

Galaxy S10 (Qualcomm)

Galaxy S10e (Qualcomm)

Galaxy Note10+ 5G (Qualcomm)

Galaxy Note10+ (Qualcomm)

Galaxy Note10 (Qualcomm)

·   All devices have same software environments (Android, Kernel, TEE)

Galaxy Tab Active3

Exynos 9810

Galaxy Tab Active3

·   All devices have same software environments (Android, Kernel, TEE)

Table 2 - Equivalent Devices


Security Evaluation Summary

The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) requirements and guidance. The evaluation demonstrated that the TOE meets the security requirements contained in the Security Target.  The criteria against which the TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1, Revision 5, April 2017. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 5, April 2017.  The product, when delivered and configured as identified in the Samsung File Encryption 1.3 Administrator Guide, Version 1.3, 04/19/2021 document, satisfies all of the security functional requirements stated in the Samsung Electronics Co., Ltd. Samsung Knox File Encryption 1.3 (PP_APP_V1.3/MOD_FE_V1.0) Security Target, Version 1.0, 04/19/2021.  The project underwent CCEVS Validator review.  The evaluation was completed in June 2021.  Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report (report number CCEVS-VR-11161-2021) prepared by CCEVS.


Environmental Strengths

The logical boundaries of Samsung Knox File Encryption 1.3 are realized in the security functions that it implements. Each of these security functions is summarized below.

Cryptographic support:

The TOE runs as part of Samsung Android 11 with Knox 3.7 and includes several cryptographic libraries for encryption/decryption/cryptographic hashing functions for securing file contents and TOE keys.

User data protection:

The TOE protects all user data within the Knox work profile by providing an automatic encryption service for all files stored within the container; applications do not have to be made aware of the Knox File Encryption service to be protected. All keys are AES 256-bit, using AES-GCM for FEK protection and AES-CBC for file content protection.

Identification and authentication:

The TOE utilizes the authentication services provided by the Knox work profile to unlock the Master Key. Unsuccessful authentication to the Knox work profile will prevent the Master Key from being unlocked, and hence no files in the container can be accessed.

Security management:

The services provided by the TOE are not available until a Knox work profile with File Encryption enabled is created on the device. Authentication management and the container lock settings are handled by the Knox work profile management and are generic for all Knox work profile configurations.

Privacy:

The TOE does not transmit Personally Identifiable Information over any network interfaces nor does it request access to any applications that may contain such information.

Protection of the TSF:

The TOE relies on the physical boundary of the evaluated platform as well as the Samsung Android operating system for the protection of the TOE’s components.

The TOE relies on the Samsung Android operating system to provide updates as the software is incorporated as part of the device image. The version of the Knox File Encryption software can be seen in the About Device page with the Knox version information (as the DualDAR version).

The TOE is a Samsung component, and all code is maintained solely by Samsung. Only documented APIs available in Samsung Android (which includes the Knox work profile and Samsung cryptographic libraries) are used.

Trusted path/channels:

The TOE does not transmit information over any network interfaces.


Vendor Information


Samsung Electronics Co., Ltd.
Brian Wood
973-440-9125
be.wood@samsung.com

www.samsung.com
Site Map              Contact Us              Home