◼
Definition of "Weak Encryption"
When <Prohibit Use of Weak Encrypt.> is set to <On>, the use of the following algorithms are prohibited.
Hash:
HMAC:
Common key
cryptosystem:
Public key
cryptosystem:
●
Even when <Prohibit Weak Encryp. Key/Cert.> is set to <On>, the hash algorithm SHA-1, which is used for
signing a root certificate, can be used.
◼
Log Management
●
The following types of logs can be managed on the machine. Collected logs can be exported in the CSV file format.
Log Type
Job Log
Transmission Log
◼
Import/Export of the Setting Data
See
Setting Menu List(P. 449) .
Appendix
MD4, MD5, SHA-1
HMAC-MD5
RC2, RC4, DES
RSA encryption (512 bits/1024 bits), RSA signature (512 bits/1024 bits), DSA (512 bits/1024
bits), DH (512 bits/1024 bits)
Number Indicated as "Log
Type" in the CSV File
128
128
736
Description
This log contains information related to the completion of
copy/fax/scan/send/print jobs.
The log contains information related to transmissions.