Table of Contents |
|
INTRODUCTION | 3 |
PURPOSE | 3 |
REFERENCES | 3 |
DOCUMENT ORGANIZATION | 3 |
ENTERASYS NETWORKS | 5 |
OVERVIEW | 5 |
CRYPTOGRAPHIC MODULE | 6 |
MODULE INTERFACES | 8 |
ROLES AND SERVICES | 11 |
Crypto Officer Role | 11 |
User Role | 14 |
Authentication Mechanisms | 14 |
PHYSICAL SECURITY | 14 |
OPERATIONAL ENVIRONMENT | 14 |
CRYPTOGRAPHIC KEY MANAGEMENT | 16 |
Key Generation | 18 |
Key Establishment | 18 |
Key Entry and Output | 18 |
Key Storage | 19 |
Key Zeroization | 19 |
20 | |
DESIGN ASSURANCE | 21 |
MITIGATION OF OTHER ATTACKS | 21 |
SECURE OPERATION | 22 |
CRYPTO OFFICER GUIDANCE | 22 |
Initial Setup | 22 |
Management | 23 |
USER GUIDANCE | 24 |
ACRONYMS | 25 |
© Copyright 2003 Enterasys Networks Page 2 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.