
Page 41 of 83
6.1.2 Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to: No other components.
Dependencies: [FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction.
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorithm shown in
Table 6] and specified cryptographic key sizes [assignment: cryptographic key size
shown in
Table 6] that meet the following: [assignment: standard shown in Table 6].
Table 6: List of Cryptographic Key Generation
Key type Standard Cryptographic key
generation algorithm
Cryptographic
key size
HDD cryptographic key BSI-AIS31 TRNG 256 bits
FCS_COP.1 Cryptographic operation
Hierarchical to: No other components.
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction.
FCS_COP.1.1 The TSF shall perform [assignment: cryptographic operations shown in
Table 7] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in
Table 7] and cryptographic key sizes [assignment: cryptographic key size
shown in
Table 7] that meet the following: [assignment: standard shown in Table 7].
Table 7: List of Cryptographic Operation
Key type Standard Cryptographic
algorithm
Cryptographic
key size
Cryptographic operations
HDD
cryptographic key
FIPS197 AES 256 bits - Encryption when writing the
Document Data on HDD
- Decryption when reading the
Document Data from HDD
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
Kommentare zu diesen Handbüchern