Cisco IPS4345 Bedienungsanleitung Seite 49

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 48
Cisco Intrusion Prevention System Security Target
7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION
7.1 Key Zeroization
The following table describes the key zeroization referenced by FCS_CKM_EXT.4 provided by
the TOE.
Table 24: TOE Key Zeroization
Critical Security Parameters
(CSPs)
Zeroization Cause and Effect
Diffie-Hellman Shared Secret
Automatically after completion of DH exchange, by calling a specific API
within the two crypto modules, when module is shutdown, or reinitialized.
Overwritten with: 0x00
Diffie Hellman private exponent
Zeroized upon completion of DH exchange, by calling a specific API within
the two crypto modules, when module is shutdown, or reinitialized.
Overwritten with: 0x00
SSH Private Key
Generation of a new key
Overwritten with: 0x00
SSH Session Key
Automatically when the SSH session is terminated.
Overwritten with: 0x00
7.2 NIST Special Publication 800-56A
The TOE is compliant with NIST SP 800-56A as described in Table 25 below.
Table 25 800-56A Compliance
Section
Exceptions to
Shall/Shall Not
Statement(s)
Should (Not)
Statements
1
TOE
Compliant?
Rationale
5.1 Cryptographic
Hash Functions
None.
None.
Yes
N/A
5.2 Message
Authentication Code
(MAC) Algorithm
None.
None.
Yes
N/A
5.2.1 MacTag
Computation
None.
None.
Yes
N/A
5.2.2 MacTag
Checking
N/A, no shall
statements
None.
Yes
N/A
5.2.3 Implementation
Validation Message
None.
None.
Yes
N/A
5.3 Random Number
None.
None.
Yes
N/A
1
This column does not include “should/should not” statements that relate to the “owner”, “recipient”, “application”,
or “party” as they are outside of the scope of the TOE.
Seitenansicht 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 60 61

Kommentare zu diesen Handbüchern

Keine Kommentare