
Security Target Version 1.02, 08/16/2013
Asymmetric key generation
Domain parameter generation
NIST Special Publication 800-56B
AES ECB and CBC (128-256 bits)
FIPS PUB 197
NIST SP 800-38A
Cryptographic signature services
RSA Digital Signature Algorithm
(rDSA) (modulus 2048)
SHA-1 and SHA-256 (digest sizes
160 and 256 bits)
Keyed-hash message authentication
HMAC-SHA-1 (digest size 160 bits)
FIPS Pub 198-1
FIPS Pub 180-3
RGB with one independent
hardware based noise source of 128
bits of non-determinism
FIPS Pub 140-2 Annex C: X9.31
Appendix 2.4 using AES
Table 7 Cryptographic Functions
While the TOE generally fulfills all of the NIST SP 800-56B requirements without extensions, the following table
specifically identifies the “should”, “should not”, and “shall not” conditions from the publication along with an
indication of whether the TOE conforms to those conditions with deviations rationalized.
NIST SP800-56B
Section Reference
“should”, “should not”, or
“shall not”
shall not (first occurrence)
shall not (second occurrence)
should (first occurrence)
should (second occurrence)
should (third occurrence)
should (fourth occurrence)
shall not (first occurrence)
shall not (second occurrence)
Table 8 NIST SP800-56B Conformance
Comentários a estes Manuais