
40
6.1 TOE Security Functional Requirements
This section identifies the Security Functional Requirements for the TOE. The TOE Security Functional
Requirements that appear Table 13 are described in more detail in the following subsections.
Table 13 TOE Security Functional Requirements
User identity association
Extended: Baseline Cryptographic Module
Symmetric Cryptographic Key Generation
Asymmetric Cryptographic key generation
Cryptographic Key Distribution
Extended: Cryptographic Key Handling and Storage
Cryptographic key destruction
Cryptographic Operation (symmetric-encryption)
Cryptographic Operation (cryptographic-signatures)
Cryptographic Operation (hashing)
Cryptographic Operation (cryptographic key agreement)
Extended: Random Number Generation
Extended: Protection of User Data
Subset residual information protection
Administrator Authentication failure handling
Administrator attribute definition
User attribute definition
Timing of local authentication
Extended: Multiple authentication mechanisms
User identification before any action
Comentarios a estos manuales