Nortel-networks Nortel Network VPN Router and Client Workstation 7 Instrukcja Użytkownika Strona 25

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 67
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 24
Security Target, Version 3.9
March 18, 2008
Nortel VPN Router v7.05 and Client Workstation v7.11
Page 25 of 67
© 2008 Nortel Networks
FCS_COP.1.1(a)
The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm
[3DES and AES] and cryptographic key sizes [168-bit key, 128 and 256-bit keys, respectively] that meet the
following: [FIPS 46-3 and FIPS 197, respectively].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(b) Cryptographic operation (authentication)
Hierarchical to: No other components.
FCS_COP.1.1(b)
The TSF shall perform [authentication] in accordance with a specified cryptographic algorithm [HMAC-
SHA-1] and cryptographic key sizes [512-bits] that meet the following: [RFC 2104].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(d) Cryptographic operation (random number generation)
Hierarchical to: No other components.
FCS_COP.1.1(d)
The TSF shall perform [random number generation] in accordance with a specified cryptographic
algorithm [SHA-1] and cryptographic key sizes [20 bytes] that meet the following: [FIPS 186-2 Appendix
3.1].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(e) Cryptographic operation (hashing)
Hierarchical to: No other components.
FCS_COP.1.1(e)
The TSF shall perform [hashing] in accordance with a specified cryptographic algorithm [SHA-1] and
cryptographic key sizes [none] that meet the following: [RFC 3174].
Przeglądanie stron 24
1 2 ... 20 21 22 23 24 25 26 27 28 29 30 ... 66 67

Komentarze do niniejszej Instrukcji

Brak uwag