Xerox Multi-Function Device Security Target
44
Copyright
2013 Xerox Corporation. All rights reserved.
Digital signature generation
and verification
FIPS 198 (cert #644 and
#1076)
*Cryptographic Algortithm Validation Program (CAVP) certificates
6.3.3.2. FCS_CKM.1 Cryptographic key generation
Hierarchical to: No other components.
Dependencies: [FCS_CKM.2 Cryptographic key distribution, or
FCS_COP.1 Cryptographic operation]
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance
with a specified cryptographic key generation algorithm
[the cryptographic algorithms listed in the Cryptographic
Algorithm column of Table 26] and specified
cryptographic key sizes [the cryptographic key sizes
listed in the Key Sizes (bits) column of Table 26] that
meet the following: [the standards in the Standards
column of Table 26].
Table 26: Cryptographic key generation
Randomization of network
interface MAC address
upon boot up.
6.3.3.3. FCS_CKM.2 Cryptographic key distribution
Hierarchical to: No other components.
Dependencies: [FDP_ITC.1 Import of user data without security
attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction