Page 53 of
93
Copyright (c) 2011 RICOH COMPANY, LTD. All rights reserved.
specified cryptographic key sizes [assignment: cryptographic key sizes in Table 13] that
meet the following: [assignment: standards in Table 13].
Table 13 : List of Cryptographic Key Generation
Key Type
Standard
Cryptographic Key
Generation Algorithm
Cryptographic
Key Size
HDD cryptographic key
BSI-AIS31
TRNG
256 bits
FCS_COP.1 Cryptographic
operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1
The TSF shall perform [assignment: cryptographic operations shown in Table 14] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in Table 14] and cryptographic key sizes [assignment: cryptographic key sizes shown
in Table 14] that meet the following: [assignment: standards shown in Table 14].
Table 14 : List of Cryptographic Operation
Key Type
Standard
Cryptographic
Algorithm
Cryptographic
Key Size
Cryptographic Operation
HDD
cryptographic
key
FIPS197
AES
256 bits
- Encryption when writing the data
on HDD
- Decryption when reading the data
from HDD
6.1.3
Class FDP: User data protection
FDP_ACC.1(a) Subset access control
Hierarchical to:
No other components.
Dependencies:
FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1(a) The TSF shall enforce the [assignment: document access control SFP] on [assignment: list
of subjects, objects, and operations among subjects and objects in Table 15].