Download  Print this page

Table 26: Cryptographic Key Generation - Xerox WorkCentre 5845 User Information

Multi-function device security target
Hide thumbs

Advertisement

Table of Contents
Cryptographic
Operations
Digital signature generation
and verification
Message digest
Message authentication
*Cryptographic Algortithm Validation Program (CAVP) certificates
6.3.3.2. FCS_CKM.1 Cryptographic key generation
Hierarchical to:
Dependencies:
FCS_CKM.1.1
Cryptographic Algorithm
Triple DES
AES
RSA
6.3.3.3. FCS_CKM.2 Cryptographic key distribution
Hierarchical to:
Dependencies:
Copyright
Xerox Multi-Function Device Security Target
Cryptographic
Algorithm
RSA
SHA-256
HMAC
No other components.
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
The TSF shall generate cryptographic keys in accordance
with a specified cryptographic key generation algorithm
[the cryptographic algorithms listed in the Cryptographic
Algorithm
column
cryptographic key sizes [the cryptographic key sizes
listed in the Key Sizes (bits) column of Table 26] that
meet the following: [the standards in the Standards
column of Table 26].

Table 26: Cryptographic key generation

Key Sizes (bits)
168
256
1024
No other components.
[FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
44
2013 Xerox Corporation. All rights reserved.
Key Sizes
Standards & Certs.*
(bits)
FIPS 186-3 (cert #914)
1024
N/A
FIPS 180-3 (cert #1599)
FIPS 198 (cert #644 and
160
#1076)
of
Table
26]
Standards
NIST 800-67
Randomization of network
interface MAC address
upon boot up.
Not specified
and
specified

Hide quick links:

Advertisement

Table of Contents
loading

  Related Manuals for Xerox WorkCentre 5845