Examples of Cryptographic key in a sentence
FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method zeroisation that meets the following: none.
Hierarchical to: No other components Dependencies: [FDP_ITC.1 or FDP_ITC.2 orFCS_CKM.1Cryptographic key generation] FCS_CKM.4 Cryptographic key destructionFCS_COP.1.1 The TSF shall perform [encryption/decryption of HDD] in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256-bit] that meet the following: [FIPS PUB 197].
Hierarchical to: No other components.Dependencies: [FCS_CKM.2 Cryptographic distribution orFCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destructionFCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [random key generation method] and specified cryptographic key sizes [256-bit] that meet the following: [None].
FCS_CKM.1/Session Cryptographic key generation for session keys FCS_CKM.1.1/SessionThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].
FCS_CKM.4/Session Keys Cryptographic key destruction FCS_CKM.4.1/Session Keys The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method (clearKey() method) that meet the following: [JCAPI222].
FCS_CKM.4/BT Cryptographic key destruction - BT FCS_CKM.4.1/BT The Basic Terminal shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method secure erase of the key value that meets the following: none.The Basic Terminal shall meet the requirement “Cryptographic operation (FCS_COP.1)” as specified below [CC-1].
FCS_CKM.1/KDF_BT Cryptographic key generation – Generation of Document Basic Access Keys by the Basic Terminal FCS_CKM.1.1/KDF_BT The Basic Terminal shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm Document Basic Access Key Derivation Algorithm and specified cryptographic key sizes 112 bit that meet the following: [PKI].The Basic Terminal shall meet the requirement “Cryptographic key destruction (FCS_CKM.4)” as specified below [CC-2].
FCS_CKM.1/Session Keys Cryptographic key generation FCS_CKM.1.1/Session Keys The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm PAP Session Keys Derivation and specified cryptographic key sizes 16 bytes that meet the following: [PM-1] and [PM-2] standard.
FCS_CKM.4/PACE Cryptographic key destruction Hierarchical to:No other componentsDependencies:[FDP_ITC.1 Import of user data without security attributes, or FDP_ITC.2 Import of user data with security attributes, orFCS_CKM.1 Cryptographic key generation]: fulfilled by FCS_CKM.1/DH_PACE andFCS_CKM.1/PERSO.
Hierarchical to:No other componentsDependencies:[FCS_CKM.2 Cryptographic key distribution or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction FCS_CKM.1.1/SCDThe TSF shall generate SCD/SVD pair in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].