Page 39 of 81
Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved.
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction.
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm [assignment: cryptographic key generation algorithm shown in
Table 5] and specified cryptographic key size [assignment: cryptographic key size shown
in Table 5] that meet the following: [assignment: standards shown in Table 5].
Table 5: List of cryptographic key generation
Key type Standard
Cryptographic key
generation algorithm
Cryptographic
key size
HDD cryptographic
key
BSI-AIS31 TRNG 256 bits
FCS_COP.1 Cryptographic operation
Hierarchical to: No other components.
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction.
FCS_COP.1.1 TSF TSF shall perform [assignment: cryptographic operations shown in Table 6] in
accordance with a specified cryptographic algorithm [assignment: cryptographic algorithm
shown in Table 6] and cryptographic key sizes [assignment: cryptographic key size
shown in Table 6] that meet the following: [assignment: standards shown in Table 6].
Table 6: List of cryptographic operations
Key type Standard
Cryptographic
algorithm
Cryptographic
key size
Cryptographic operations
HDD
cryptographic
key
FIPS197 AES 256 bits
- Encryption when writing the
document data on HDD
- Encryption when reading the
document data from HDD
6.1.3 Class FDP: User data protection
FDP_ACC.1 Subset access control
Hierarchical to: No other components.
Dependencies: FDP_ACF.1 Security attribute based access control.
FDP_ACC.1.1 The TSF shall enforce the [assignment: MFP access control SFP] on [assignment: List of
Subjects, Objects, and Operation among Subjects and Objects in Table7].