Page 51 of
91
Copyright (c) 2012 RICOH COMPANY, LTD. All rights reserved.
specified cryptographic key sizes
[assignment: cryptographic key sizes in Table 12]
that
meet the following:
[assignment: standards in Table 12]
.
Table 12 : List of Cryptographic Key Generation
Key Type
Standard
Cryptographic Key
Generation Algorithm
Cryptographic
Key Size
HDD cryptographic key
BSI-AIS31
TRNG
256 bits
FCS_COP.1 Cryptographic operation
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1
The TSF shall perform
[assignment: cryptographic operations shown in Table 13]
in
accordance with a specified cryptographic algorithm
[assignment: cryptographic algorithm
shown in Table 13]
and cryptographic key sizes
[assignment: cryptographic key sizes shown
in Table 13]
that meet the following:
[assignment: standards shown in Table 13]
.
Table 13 : List of Cryptographic Operation
Key Type
Standard
Cryptographic
Algorithm
Cryptographic
Key Size
Cryptographic Operation
HDD
cryptographic
key
FIPS197
AES
256 bits
- Encryption when writing the data
on HDD
- Decryption when reading the data
from HDD
6.1.3
Class FDP: User data protection
FDP_ACC.1(a) Subset access control
Hierarchical to:
No other components.
Dependencies:
FDP_ACF.1 Security attribute based access control
FDP_ACC.1.1(a) The TSF shall enforce the
[assignment: document access control SFP]
on
[assignment: list
of subjects, objects, and operations among subjects and objects in Table 14]
.