Ricoh Aficio MP C3001 Security Target - Page 54
Table 13 : List of Cryptographic Key Generation
View all Ricoh Aficio MP C3001 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 54 highlights
Page 53 of 93 specified cryptographic key sizes [assignment: cryptographic key sizes in Table 13] that meet the following: [assignment: standards in Table 13]. Table 13 : List of Cryptographic Key Generation Key Type HDD cryptographic key Standard BSI-AIS31 Cryptographic Key Generation Algorithm TRNG Cryptographic Key Size 256 bits FCS_COP.1 Cryptographic operation Hierarchical to: No other components. Dependencies: [FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, or FCS_CKM.1 Cryptographic key generation] FCS_CKM.4 Cryptographic key destruction FCS_COP.1.1 The TSF shall perform [assignment: cryptographic operations shown in Table 14] in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm shown in Table 14] and cryptographic key sizes [assignment: cryptographic key sizes shown in Table 14] that meet the following: [assignment: standards shown in Table 14]. Key Type HDD cryptographic key Table 14 : List of Cryptographic Operation Standard FIPS197 Cryptographic Algorithm AES Cryptographic Key Size 256 bits Cryptographic Operation - Encryption when writing the data on HDD - Decryption when reading the data from HDD 6.1.3 Class FDP: User data protection FDP_ACC.1(a) Subset access control Hierarchical to: No other components. Dependencies: FDP_ACF.1 Security attribute based access control FDP_ACC.1.1(a) The TSF shall enforce the [assignment: document access control SFP] on [assignment: list of subjects, objects, and operations among subjects and objects in Table 15]. Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.