Examples of Cryptographic key in a sentence
Hierarchical to: No other components Dependencies: [FDP_ITC.1 or FDP_ITC.2 orFCS_CKM.1Cryptographic key generation] FCS_CKM.4 Cryptographic key destructionFCS_COP.1.1 The TSF shall perform [encryption/decryption of HDD] in accordance with a specified cryptographic algorithm [AES] and cryptographic key sizes [256-bit] that meet the following: [FIPS PUB 197].
Hierarchical to: No other components.Dependencies: [FCS_CKM.2 Cryptographic distribution orFCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destructionFCS_CKM.1.1 The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [random key generation method] and specified cryptographic key sizes [256-bit] that meet the following: [None].
FCS_CKM.4 Cryptographic key destruction FCS_CKM.4.1 The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method zeroisation that meets the following: none.
FCS_CKM.1/Session Cryptographic key generation for session keys FCS_CKM.1.1/SessionThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].
FCS_CKM.4/BT Cryptographic key destruction - BT FCS_CKM.4.1/BT The Basic Terminal shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method secure erase of the key value that meets the following: none.The Basic Terminal shall meet the requirement “Cryptographic operation (FCS_COP.1)” as specified below [CC-1].
FCS_CKM.1/Session Keys Cryptographic key generation FCS_CKM.1.1/Session Keys The TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm PAP Session Keys Derivation and specified cryptographic key sizes 16 bytes that meet the following: [PM-1] and [PM-2] standard.
FCS_CKM.4/Session Keys Cryptographic key destruction FCS_CKM.4.1/Session Keys The TSF shall destroy cryptographic keys in accordance with a specified cryptographic key destruction method (clearKey() method) that meet the following: [JCAPI222].
See also 47 CFR 76.56(d)(3).27 See NAB Reply Comments at 2–3.28 See Fourth FNPRM, at para.
FCS_CKM.1 /AA Cryptographic key generation for AA FCS_CKM.1.1/AAThe TSF shall generate cryptographic keys in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].
Hierarchical to:No other componentsDependencies:[FCS_CKM.2 Cryptographic key distribution or FCS_COP.1 Cryptographic operation] FCS_CKM.4 Cryptographic key destruction FCS_CKM.1.1/SCDThe TSF shall generate SCD/SVD pair in accordance with a specified cryptographic key generation algorithm [assignment: cryptographic key generation algorithm] and specified cryptographic key sizes [assignment: cryptographic key sizes] that meet thefollowing: [assignment: list of standards].