8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 ... 13 14 15 16 17 18 19 ... 117

FCSCKM.1 Cryptographic key generation

Hierarchical to: No other components.

FCSCKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of standards].

Dependencies: [FCSCKM.2 Cryptographic key distribution or

FCS COP.1 Cryptographic operation] FCSCKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes

FCS CKM.2 Cryptographic key distribution Hierarchical to: No other components.

FCS CKM.2.1 The TSF shall distribute cryptographic keys in accordance with a specified cryptographic key distribution method [assignment: cryptographic key distribution method] that meets the following: [assignment: list of standards].

Dependencies: [FDPITC.1 Import of user data without security attributes or

FCS CKM.1 Cryptographic key generation] FCS CKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes

FCSCKM.3 Cryptographic key access

Hierarchical to: No other components.

FCS CKM.3.1 The TSF shall perform [assignment: type ofcryptographic key access] in accordance with a specified cryptographic key access method [assignment: cryptographic key access method] that meets the following: [assignment: list of standards].

Dependencies: [FDPITC.1 Import of user data without security attributes or

FCS CKM.1 Cryptographic key generation] FCS CKM.4 Cryptographic key destruction FMT MSA.2 Secure security attributes


FCSCKM.4 Cryptographic key destruction

Hierarchical to: No other components.

FCSCKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method [assignment: cryptographic key destruction method] that meets the following: [assignment: list of standards].

Dependencies: [FDPITC.1 Import of user data without security attributes or

FCS CKM.1 Cryptographic key generation] FMTMSA.2 Secure security attributes


5.2 Cryptographic operation (FCS COP)

Family behaviour

In order for a cryptographic operation to function correctly, the operation must be performed in accordance with a specified algorithm and with a cryptographic key of a specified size. This family should be included whenever there are requirements for cryptographic operations to be performed.

Typical cryptographic operations include data encryption and/or decryption, digital signature generation and/or verification, cryptographic checksum generation for integrity and/or verification of checksum, secure hash (message digest), cryptographic key encryption and/or decryption, and cryptographic key agreement.

Component levelling

FCS COP Cryptographic operation\-\ 1

FCSCOP.1 Cryptographic operation requires a cryptographic operation to be performed in accordance with a specified algorithm and with a cryptographic key of specified sizes. The specified algorithm and cryptographic key sizes can be based on an assigned standard.

Management: FCS COP.1

There are no management activities foreseen for these components. Audit: FCSCOP.1

The following actions should be auditable if FAU GEN Security Audit Data Generation is

included in the PP/ST:

a)Minimal: Success and failure, and the type ofcryptographic operation.

b)Basic: Any applicable cryptographic mode(s) of operation, subject attributes and object attributes.

FCS COP.1 Cryptographic operation

Hierarchical to: No other components.

FCSCOP.1.1 The TSF shall perform [assignment: list of cryptographic operations] in accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm] and cryptographic key sizes [assignment: cryptographic key sizes] that meet the following: [assignment: list of standards].



0 ... 13 14 15 16 17 18 19 ... 117