Canon MF264dw II User Manual page 45

Hide thumbs Also See for MF264dw II:
Table of Contents

Advertisement

Certificate signature algorithm
*1
Requirements for the certificate contained in a key are pursuant to CA certificates.
*2
Certificates of more than 2 MB cannot be registered.
*3
SHA384-RSA and SHA512-RSA are available only when the RSA key length is 1024 bits or more.
The machine does not support use of a certificate revocation list (CRL).
Definition of "Weak Encryption"
When [Prohibit Use of Weak Encryption] in [Encryption Settings] is set to [On], the use of the following algorithms is
prohibited.
[Encryption Settings](P. 509)
Hash
HMAC
Common key encryption
Public key encryption
Even when [Prohibit Key/Cert. with Weak Encryption] in [Encryption Settings] is set to [On], the hash
algorithm SHA-1, which is used for signing a root certificate, can be used.
TLS
The following combinations of the TLS version and algorithm are usable:
: Usable
: Not usable
Algorithm
Encryption Algorithm
About the Machine
RSA: SHA-256, SHA-384
ECDSA: SHA-256, SHA-384, SHA-512
MD4, MD5, SHA-1
HMAC-MD5
RC2, RC4, DES
RSA encryption (512 bits/1024 bits)
RSA signature (512 bits/1024 bits)
DSA (512 bits/1024 bits)
DH (512 bits/1024 bits)
TLS Version
TLS 1.3 TLS 1.2 TLS 1.1 TLS 1.0
*3
*3
, SHA-512
36

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mf267dw ii

Table of Contents