
Cisco Intrusion Prevention System Security Target
7 SUPPLEMENTAL CRYPTOGRAPHIC INFORMATION
7.1 Key Zeroization
The following table describes the key zeroization referenced by FCS_CKM_EXT.4 provided by
the TOE.
Table 24: TOE Key Zeroization
Critical Security Parameters
(CSPs)
Zeroization Cause and Effect
Diffie-Hellman Shared Secret
Automatically after completion of DH exchange, by calling a specific API
within the two crypto modules, when module is shutdown, or reinitialized.
Overwritten with: 0x00
Diffie Hellman private exponent
Zeroized upon completion of DH exchange, by calling a specific API within
the two crypto modules, when module is shutdown, or reinitialized.
Overwritten with: 0x00
Generation of a new key
Overwritten with: 0x00
Automatically when the SSH session is terminated.
Overwritten with: 0x00
7.2 NIST Special Publication 800-56A
The TOE is compliant with NIST SP 800-56A as described in Table 25 below.
Table 25 800-56A Compliance
Exceptions to
Shall/Shall Not
Statement(s)
5.1 Cryptographic
Hash Functions
5.2 Message
Authentication Code
(MAC) Algorithm
5.2.3 Implementation
Validation Message
This column does not include “should/should not” statements that relate to the “owner”, “recipient”, “application”,
or “party” as they are outside of the scope of the TOE.
Kommentare zu diesen Handbüchern