1
Introduction.................................................................................................................. 3
1.1
Purpose................................................................................................................... 3
1.2
References............................................................................................................... 3
1.3
Terminology............................................................................................................. 3
1.4
Document Organization............................................................................................ 3
2
2.1
Cryptographic Module............................................................................................. 5
2.2
Module Interfaces.................................................................................................... 5
2.3
2.4
Roles and Services................................................................................................. 10
2.4.1
2.4.2
User Services................................................................................................. 12
2.5
Key Management .................................................................................................. 13
2.6
Self Tests............................................................................................................... 13
3
Table of Contents
© Copyright 2000 Nortel Networks.
2