Nortel Networks Nortel Network VPN Router and Client Workstation 7.05 User Manual
Page 25
Security Target, Version 3.9
March 18, 2008
Nortel VPN Router v7.05 and Client Workstation v7.11
Page 25 of 67
© 2008 Nortel Networks
FCS_COP.1.1(a)
The TSF shall perform [encryption and decryption] in accordance with a specified cryptographic algorithm
[3DES and AES] and cryptographic key sizes [168-bit key, 128 and 256-bit keys, respectively] that meet the
following: [FIPS 46-3 and FIPS 197, respectively].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(b)
Cryptographic operation (authentication)
Hierarchical to: No other components.
FCS_COP.1.1(b)
The TSF shall perform [authentication] in accordance with a specified cryptographic algorithm [HMAC-
SHA-1] and cryptographic key sizes [512-bits] that meet the following: [RFC 2104].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(d)
Cryptographic operation (random number generation)
Hierarchical to: No other components.
FCS_COP.1.1(d)
The TSF shall perform [random number generation] in accordance with a specified cryptographic
algorithm [SHA-1] and cryptographic key sizes [20 bytes] that meet the following: [FIPS 186-2 Appendix
3.1].
Dependencies: [FDP_ITC.1 Import of user data without security attributes, or
FDP_ITC.2 Import of user data with security attributes, or
FCS_CKM.1 Cryptographic key generation]
FCS_CKM.4 Cryptographic key destruction
FMT_MSA.2 Secure security attributes
FCS_COP.1(e)
Cryptographic operation (hashing)
Hierarchical to: No other components.
FCS_COP.1.1(e)
The TSF shall perform [hashing] in accordance with a specified cryptographic algorithm [SHA-1] and
cryptographic key sizes [none] that meet the following: [RFC 3174].