Nortel Networks Nortel Network VPN Router and Client Workstation 7.05 User Manual

Page 25

Advertising
background image

Security Target, Version 3.9

March 18, 2008

Nortel VPN Router v7.05 and Client Workstation v7.11

Page 25 of 67

© 2008 Nortel Networks

FCS_COP.1.1(a)

The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm
[3DES and AES] and cryptographic key sizes [168-bit key, 128 and 256-bit keys, respectively] that meet the
following: [FIPS 46-3 and FIPS 197, respectively].

Dependencies: [FDP_ITC.1 Import of user data without security attributes, or

FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes

FCS_COP.1(b)

Cryptographic operation (authentication)

Hierarchical to: No other components.

FCS_COP.1.1(b)

The TSF shall perform [authentication] in accordance with a specified cryptographic algorithm [HMAC-
SHA-1
] and cryptographic key sizes [512-bits] that meet the following: [RFC 2104].

Dependencies: [FDP_ITC.1 Import of user data without security attributes, or

FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes

FCS_COP.1(d)

Cryptographic operation (random number generation)

Hierarchical to: No other components.

FCS_COP.1.1(d)

The TSF shall perform [random number generation] in accordance with a specified cryptographic
algorithm [SHA-1] and cryptographic key sizes [20 bytes] that meet the following: [FIPS 186-2 Appendix
3.1
].

Dependencies: [FDP_ITC.1 Import of user data without security attributes, or

FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes

FCS_COP.1(e)

Cryptographic operation (hashing)

Hierarchical to: No other components.

FCS_COP.1.1(e)

The TSF shall perform [hashing] in accordance with a specified cryptographic algorithm [SHA-1] and
cryptographic key sizes [none] that meet the following: [RFC 3174].

Advertising
This manual is related to the following products: