Specifications

47
functions
Digital Signature Algorithm (DSA) with a key size (modulus) of [2048 bits],
RSA Digital Signature Algorithm (rDSA) with a key size (modulus) of [2048 bits]
that meets NIST Special Publication 800-57, "Recommendation for Key Management."
6.1.12 FCS_COP.1(3) Cryptographic Operation (Hashing)
FCS_COP.1.1(3) The TSF shall perform cryptographic hashing services using the FIPS-approved security
function Secure Hash Algorithm and message digest size of 160 bits or 256 bits.
6.1.13 FCS_COP.1(4) Cryptographic Operation (Cryptographic Key Agreement)
FCS_COP.1.1(4) The TSF shall perform cryptographic key agreement services using the FIPS-approved
security function as specified in NIST Special Publication 800-56A, "Recommendation for
Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography" [Diffie-
Hellman] and cryptographic key sizes (modulus) of [2048 bits] that meets NIST Special
Publication 800-57, "Recommendation for Key Management."
6.1.14 FCS_COP_(EXT).1 Extended: Random Number Generation
FCS_COP_(EXT).1 The TSF shall perform all random number generation (RNG) services in a ccordance with
a FIPS-approved RNG [X9.31 or FIPS 186-2] seeded by entropy gathered during startup
via an entropy gathering process.
FCS_COP_(EXT).1.2 The TSF shall defend against tampering of the random number generation (RNG)/
pseudorandom number generation (PRNG) sources.
6.1.15 FDP_PUD_(EXT).1 Extended: Protection of User Data
FDP_PUD_(EXT).1.1 When the administrator has enabled encryption of wireless client data during
transmission, the TSF shall:
encrypt authenticated user data transmitted to a wireless client from the radio
interface of the wireless access system using the cryptographic algorithm(s) specified
in FCS_COP_(EXT).2 FCS_COP.1(1);
decrypt authenticated user data received from a wireless client by the radio interface
of the wireless access system using the cryptographic algorithm(s) specified in
FCS_COP_(EXT).2 FCS_COP.1(1).
Application Note This requirement helps support carrying out end to end security for this wireless
solution. User data is protected in transit from wireless client to the trusted boundary of
the access points (the APs) where it then is decrypted and enters the protected wired
network.
6.1.16 FDP_RIP.1(1) Subset Residual Information Protection
FDP_RIP.1.1(1) The TSF shall ensure that any previous information content of a resource is made unavailable
upon the allocation of the resource to the following objects: network packet objects.