other actions to be taken in case of audit storage failure] if the audit trail is full.
6.1.2
Class FCS: Cryptographic support
FCS_CKM.1 Cryptographic key generation
Hierarchical to:
Dependencies:
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorith m shown in:
Table 5
Table 5
in
Key type
HDD
cryptographic
key
FCS_COP.1
Cryptographic operation
Hierarchical to:
Dependencies:
FCS_COP.1.1
TSF TSF shall perform [ a ssignment: cryptographic operations shown in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in
shown in
Key type
Standard
HDD
FIPS197
cryptographic
key
Copyright (c) 2009,2010 RICOH COMPANY, LTD. All Rights Reserved.
No other components.
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction.
] and specified cryptographic key size [assignment: cryptographic key size shown
] that meet the following: [assignment: standards shown in
Table 5: List of cryptographic key generation
Standard
BSI-AIS31
No other components.
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction.
Table 6
] and cryptographic key sizes [assignment: cryptographic key size
Table 6
] that meet the following: [assignment: standards shown in
Table 6: List of cryptographic operations
Cryptographic
Cryptographic
algorithm
AES
256 bits
Cryptographic key
generation algorithm
TRNG
Cryptographic operations
key size
- Encryption when writing the
document data on HDD
- Encryption when reading the
document data from HDD
Page 38 of 80
Table 5
].
Cryptographic
key size
256 bits
Table 6
] in
Table 6
].