HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 54 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
Table 25: Cryptographic key generation
Application Note: Key generation for FCS_CKM.1 is implemented with the SSH random number
generator described in section 29.5.3 (pages 1044-1045) of [QuickSec51].
Cryptographic key distribution (FCS_CKM.2) 6.1.2.2
The QuickSec cryptographic library in the Operational Environment TSF shall
distribute cryptographic keys in accordance with a specified cryptographic key
distribution method defined in Table 26: Cryptographic key distribution that
meets the following: the standards defined in Table 26: Cryptographic key
distribution.
[RFC2409] The Internet Key Exchange (IKE);
[RFC4109] Algorithms for Internet Key Exchange version 1 (IKEv1)
[RFC4306] Diffie-Hellman key agreement method defined for the IKEv2
protocol;
[RFC4718] IKEv2 Clarifications and Implementation Guidelines
Table 26: Cryptographic key distribution
Cryptographic operation (FCS_COP.1-ipsec) 6.1.2.3
The QuickSec cryptographic library in the Operational Environment TSF shall perform the
operations defined in Table 27: Cryptographic operations in accordance with a
specified cryptographic algorithm defined in Table 27: Cryptographic operations and
cryptographic key sizes defined in Table 27: Cryptographic operations that meet the
following: the standards defined in Table 27: Cryptographic operations.
[PKCS1v1.5] Public-Key
Cryptography Standard (PKCS) #1:
RSA Encryption Standard
Symmetric
encryption and
decryption
[FIPS197] Advanced Encryption
Standard;
[SP800-38A] Recommendation for
Block Cipher Modes of Operation:
Methods and Techniques
[RFC2104] HMAC: Keyed-Hashing
for Message Authentication