Xerox Multi-Function Device Security Target
44
Copyright
2013 Xerox Corporation. All rights reserved.
Cryptographic
Operations
Cryptographic
Algorithm
Key Sizes
(bits)
Standards & Certs.*
Digital signature generation
and verification
RSA
1024
FIPS 186-3 (cert #914)
Message digest
SHA-256
N/A
FIPS 180-3 (cert #1599)
Message authentication
HMAC
160
FIPS 198 (cert #644 and
#1076)
*Cryptographic Algortithm Validation Program (CAVP) certificates
6.3.3.2. FCS_CKM.1 Cryptographic key generation
Hierarchical to:
No other components.
Dependencies:
[FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1
The TSF shall generate cryptographic keys in accordance
with a specified cryptographic key generation algorithm
[the cryptographic algorithms listed in the Cryptographic
Algorithm
column
of
Table
26]
and
specified
cryptographic key sizes [the cryptographic key sizes
listed in the Key Sizes (bits) column of Table 26] that
meet the following: [the standards in the Standards
column of Table 26].
Table 26: Cryptographic key generation
Cryptographic Algorithm
Key Sizes (bits)
Standards
Triple DES
168
NIST 800-67
AES
256
Randomization of network
interface MAC address
upon boot up.
RSA
1024
Not specified
6.3.3.3. FCS_CKM.2 Cryptographic key distribution
Hierarchical to:
No other components.
Dependencies:
[FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction