Security Target, Version 3.9 | March 18, 2008 |
|
|
FCS_COP.1.1(a)
The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm [3DES and AES] and cryptographic key sizes
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(b) | Cryptographic operation (authentication) |
Hierarchical to: No other components.
FCS_COP.1.1(b)
The TSF shall perform [authentication] in accordance with a specified cryptographic algorithm [HMAC-
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(d) | Cryptographic operation (random number generation) |
Hierarchical to: No other components.
FCS_COP.1.1(d)
The TSF shall perform [random number generation] in accordance with a specified cryptographic algorithm
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(e) | Cryptographic operation (hashing) |
Hierarchical to: No other components.
FCS_COP.1.1(e)
The TSF shall perform [hashing] in accordance with a specified cryptographic algorithm
Nortel VPN Router v7.05 and Client Workstation v7.11 | Page 25 of 67 |
© 2008 Nortel Networks |
|