Installation guide

Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 58 of 85
is reallocated.
P.CRYPTOGRAPHY_VALIDATE
D
Only NIST FIPS validated
cryptography (methods and
implementations) are acceptable
for key management (i.e.;
generation, access, distribution,
destruction, handling, and storage
of keys) and cryptographic
services (i.e.; encryption,
decryption, signature, hashing,
key exchange, and random
number generation services).
O.CRYPTOGRAPHY
The TOE shall provide
cryptographic functions to
maintain the confidentiality
and allow for detection of
modification of user data that
is transmitted between
physically separated portions
of the TOE, or outside of the
TOE.
O.CRYPTOGRAPHY_VALID
ATED
The TOE will use NIST FIPS
140-1/2 validated
cryptomodules for
cryptographic services
implementing NIST-approved
security functions and
random number generation
services used by
cryptographic functions.
O.CRYPTOGRAPHY satisfies
this policy by requiring the TOE
to implement NIST FIPS
validated cryptographic
services. These services will
provide confidentiality and
integrity protection of TSF data
while in transit to remote parts
of the TOE.
O.CRYPTOGRAPHY_VALIDA
TED satisfies this policy by
requiring that all cryptomodules
for cryptographic services be
NIST 140-1/2 validated. This
will provide assurance that the
NIST-approved security
functions and random number
generation will be in
accordance with NIST and
validated according the FIPS
140-1/2