Class Fcs: Cryptographic Support; Table 13 : List Of Cryptographic Key Generation; Table 14 : List Of Cryptographic Operation - Ricoh Aficio MP 4002 Manual

Aficio mp 4002/5002 series security target
Hide thumbs Also See for Aficio MP 4002:
Table of Contents

Advertisement

FAU_SAR.2 Restricted audit review
Hierarchical to:
No other components.
Dependencies:
FAU_SAR.1 Audit review
FAU_SAR.2.1
The TSF shall prohibit all users read access to the audit records, except those users that have
been granted explicit read-access.
6.1.2

Class FCS: Cryptographic support

FCS_CKM.1 Cryptographic key generation
Hierarchical to:
No other components.
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1
The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorithm in Table 13] and
specified cryptographic key sizes [assignment: cryptographic key sizes in Table 13] that
meet the following: [assignment: standards in Table 13].
Key Type
HDD cryptographic key
FCS_COP.1 Cryptographic operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1
The TSF shall perform [assignment: cryptographic operations shown in Table 14] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in Table 14] and cryptographic key sizes [assignment: cryptographic key sizes shown
in Table 14] that meet the following: [assignment: standards shown in Table 14].
Key Type
HDD
cryptographic
key
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.

Table 13 : List of Cryptographic Key Generation

Standard
BSI-AIS31

Table 14 : List of Cryptographic Operation

Standard
Cryptographic
Algorithm
FIPS197
AES
Cryptographic Key
Generation Algorithm
TRNG
Cryptographic
Key Size
256 bits
- Encryption when writing the data
on HDD
- Decryption when reading the data
Page 52 of 93
Cryptographic
Key Size
256 bits
Cryptographic Operation

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents