Specifications

Samsung MFP Security Kit Type_B V1.5 Security Target
49
Copyright
2010 Samsung Electronics Co., Ltd., All rights reserved
FAU_STG.4.1 The TSF shall overwrite the oldest stored audit
records and [no other actions] if the audit trail is
full.
5.1.2 Class FCS: Cryptographic support
5.1.2.1 FCS_CKM.1 Cryptographic key generation
Hierarchical to: No other components
Dependencies: FCS_COP.1 Cryptographic operation
FCS_CKM.4 Cryptographic key destruction
FCS_CKM.1.1 The TSF shall generate cryptographic keys in
accordance with a specified cryptographic key
generation algorithm [random key generation
method] and specified cryptographic key sizes
[256-bit] that meet the following: [IEEE 802.11i
standard].
5.1.2.2 FCS_CKM.4 Cryptographic key destruction
Hierarchical to: No other components.
Dependencies: FCS_CKM.1 Cryptographic key generation
FCS_CKM.4.1 The TSF shall destroy cryptographic keys in
accordance with a specified cryptographic key
destruction method [overwrite used cryptographic
key using new generation cryptographic key
Previous cryptographic keys will be overwritten
with a newly generated key] that meets the
following: [None].
5.1.2.3 FCS_COP.1 Cryptographic operation
Hierarchical to: No other components.
Dependencies: FCS_CKM.1 Cryptographic key generation
FCS_CKM.4 Cryptographic key destruction
FCS_COP.1.1 The TSF shall perform [cryptographic operation of
data in HDD] in accordance with a specified
cryptographic algorithm [AES] and cryptographic
key sizes [256-bit] that mwweet the following:
[FIPS PUB 197].