Раздел: Документация
0 ... 13 14 15 16 17 18 19 ... 117 FCSCKM.1 Cryptographic key generation Hierarchical to: No other components. FCSCKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of standards]. Dependencies: [FCSCKM.2 Cryptographic key distribution or FCS COP.1 Cryptographic operation] FCSCKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes FCS CKM.2 Cryptographic key distribution Hierarchical to: No other components. FCS CKM.2.1 The TSF shall distribute cryptographic keys in accordance with a specified cryptographic key distribution method [assignment: cryptographic key distribution method] that meets the following: [assignment: list of standards]. Dependencies: [FDPITC.1 Import of user data without security attributes or FCS CKM.1 Cryptographic key generation] FCS CKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes FCSCKM.3 Cryptographic key access Hierarchical to: No other components. FCS CKM.3.1 The TSF shall perform [assignment: type ofcryptographic key access] in accordance with a specified cryptographic key access method [assignment: cryptographic key access method] that meets the following: [assignment: list of standards]. Dependencies: [FDPITC.1 Import of user data without security attributes or FCS CKM.1 Cryptographic key generation] FCS CKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes FCSCKM.4 Cryptographic key destruction Hierarchical to: No other components. FCSCKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method [assignment: cryptographic key destruction method] that meets the following: [assignment: list of standards]. Dependencies: [FDPITC.1 Import of user data without security attributes or FCS CKM.1 Cryptographic key generation] FMTMSA.2 Secure security attributes 5.2 Cryptographic operation (FCS COP) Family behaviour In order for a cryptographic operation to function correctly, the operation must be performed in accordance with a specified algorithm and with a cryptographic key of a specified size. This family should be included whenever there are requirements for cryptographic operations to be performed. Typical cryptographic operations include data encryption and/or decryption, digital signature generation and/or verification, cryptographic checksum generation for integrity and/or verification of checksum, secure hash (message digest), cryptographic key encryption and/or decryption, and cryptographic key agreement. Component levelling FCS COP Cryptographic operation\-\ 1 FCSCOP.1 Cryptographic operation requires a cryptographic operation to be performed in accordance with a specified algorithm and with a cryptographic key of specified sizes. The specified algorithm and cryptographic key sizes can be based on an assigned standard. Management: FCS COP.1 There are no management activities foreseen for these components. Audit: FCSCOP.1 The following actions should be auditable if FAU GEN Security Audit Data Generation is included in the PP/ST: a)Minimal: Success and failure, and the type ofcryptographic operation. b)Basic: Any applicable cryptographic mode(s) of operation, subject attributes and object attributes. FCS COP.1 Cryptographic operation Hierarchical to: No other components. FCSCOP.1.1 The TSF shall perform [assignment: list of cryptographic operations] in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm] and cryptographic key sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of standards]. 0 ... 13 14 15 16 17 18 19 ... 117
|