
McAfee Email Gateway
Security Target
Page 44 of 61
FCS_COP.1(3) Cryptographic Operation (for cryptographic hashing)
FCS_COP.1.1(3) The TSF shall perform [cryptographic hashing services] in accordance with a
specified cryptographic algorithm [SHA-1, SHA-256
] and cryptographic key
message digest sizes [160 bits, 256 bits
] that meet the following: [FIPS Pub 180-3,
“Secure Hash Standard”].
FCS_COP.1(4) Cryptographic Operation (for keyed-hash message authentication)
FCS_COP.1.1(4) The TSF shall perform [keyed-hash message authentication] in accordance with a
specified cryptographic algorithm HMAC-[SHA1, SHA-256
] and cryptographic key
sizes [128, 256 bits], and message digest sizes [160, 256
] bits that meet the
following: [FIPS Pub 198-1, "The Keyed-Hash Message Authentication Code, and
FIPS Pub 180-3, “Secure Hash Standard”].
FCS_RBG_EXT.1 Extended: Cryptographic Operation (Random Bit Generation)
FCS_RBG_EXT.1.1 The TSF shall perform all random bit generation (RBG) services in accordance
with [FIPS Pub 140-2 Annex C: X9.31 Appendix A.2.4 using AES
] seeded by an
entropy source that accumulated entropy from [a TSF-hardware-based noise source
].
FCS_RBG_EXT.1.2 The deterministic RBG shall be seeded with a minimum of [128 bits
] of entropy at
least equal to the greatest bit length of the keys and authorization factors that it will
generate.
FCS_SSH_EXT.1 SSH
FCS_SSH_EXT.1.1 The TSF shall implement the SSH protocol that complies with RFCs 4251, 4252,
4253, and 4254.
FCS_SSH_EXT.1.2 The TSF shall ensure that the SSH protocol implementation supports the
following authentication methods as described in RFC 4252: public key based,
password-based.
FCS_SSH_EXT.1.3 The TSF shall ensure that, as described in RFC 4253,packets greater than [256k]
bytes in an SSH transport connection are dropped.
FCS_SSH_EXT.1.4 The TSF shall ensure that the SSH transport implementation uses the following
encryption algorithms: AES-CBC-128, AES-CBC-256 [no other algorithms].
FCS_SSH_EXT.1.5 The TSF shall ensure that the SSH transport implementation uses SSH__RSA
and [no other public key algorithms] as its public key algorithm(s).
FCS_SSH_EXT.1.6 The TSF shall ensure that data integrity algorithms used in SSH transport
connection is [hmac-sha1, hmac-sha1-96
].
FCS_SSH_EXT.1.7 The TSF shall ensure that diffie-hellman-group14-sha1 is the only allowed key
exchange method used for the SSH protocol.
FCS_TLS_EXT.1 TLS
FCS_TLS_EXT.1.1 The TSF shall implement one or more of the following protocols [TLS 1.0, (RFC
2246)] supporting the following ciphersuites:
Mandatory Ciphersuites
Commentaires sur ces manuels