Cisco Cat4K NDPP ST
11 March 2014
EDCS-1228241
44
ANSI X9.80 (3 January 2000), “Prime Number
Generation,
Primality
Testing,
and
Primality
Certificates” using random integers with deterministic
tests, or constructive generation methods
Generated key strength shall be equivalent to, or
greater than, a symmetric key strength of 112 bits using
conservative estimates.
c) Case: For domain parameters used in RSA-based key
establishment schemes
NIST Special Publication 800-56B “Recommendation
for Pair-Wise Key Establishment Schemes Using
Integer Factorization Cryptography”
5.2.2.2
FCS_CKM_EXT.4: Cryptographic key zeroization
FCS_CKM_EXT.4.1
The TSF shall zeroize all plaintext secret and private
cryptographic keys and CSPs when no longer required.
5.2.2.3
FCS_COP.1(1): Cryptographic operation (for data encryption/decryption)
FCS_COP.1.1(1)
The TSF shall perform [
encryption and decryption
] in
accordance with a specified cryptographic algorithm [
AES
operating in
[
CBC mode
]]
and cryptographic key sizes 128-
bits, 256-bits, and [
no other key sizes
] that meets the
following:
FIPS PUB 197, “Advanced Encryption Standard
(AES)”
[
NIST SP 800-38A, NIST SP 800-38D
].
5.2.2.4
FCS_COP.1(2): Cryptographic operation (for cryptographic signature)
FCS_COP.1.1(2) The TSF shall perform
cryptographic signature services
in
accordance with a [
(2) RSA Digital Signature Algorithm
(rDSA) with a key size (modulus) of 2048 bits or greater
]
that
meets the following:
Case: RSA Digital Signature Algorithm
[
FIPS PUB 186-3, “Digital Signature Standard
]
5.2.2.5
FCS_COP.1(3): Cryptographic operation (for cryptographic hashing)
FCS_COP.1.1(3) The TSF shall perform [
cryptographic hashing services
] in
accordance with a specified cryptographic algorithm [
SHA-1,