Specifications
S E C U R I T Y T A R G E T D T C O 1 3 8 1 , R e l e a s e 1 . 3 v
Designed by
Date
Department
Released by
Winfried Rogenz
Date
2012-04-25
Department
I CV AM TTS
LR
H
Designation
Security Target DTCO 1381, Release 1.3v
Document
40225345 SPE 000 AB
Version
Pages
45 / 52
Observe
Protection marks for restricting the use of documents and products
(DIN 34: 1998-01)
The copying, distribution and utilization of this document as well as the
communication of its contents to others without expressed authorization
is prohibited. Offenders will be held liable for the payment of damages.
All rights reserved in the event of the grant of a patent, utility model or
ornamental design registration.
Observe
Protection marks for restricting the use of documents and products
(DIN 34: 1998-01)
6.8.3 Data exchange with external storage media (downloading function))
DEX_206
The VU shall generate an evidence of origin for data downloaded to external media.
DEX_207
The VU shall provide a capability to verify the evidence of origin of downloaded data to
the recipient.
DEX_208
The VU shall download data to external storage media with associated security attributes
such that downloaded data integrity and authenticity can be verified.
6.9 Cryptographic support
The requirements of this paragraph are applicable only where needed, depending upon security
mechanisms used and upon the manufacturer’s solutions.
<SEF9>
The TOE provides this security enforcing function of cryptographic support.
This SEF includes the following features:
CSP_201
Any cryptographic operation performed by the VU shall be in accordance with a specified
algorithm and a specified key size.
CSP_202
If the VU generates cryptographic keys, it shall be in accordance with specified crypto-
graphic key generation algorithms and specified cryptographic key sizes
CSP_203
If the VU distributes cryptographic keys, it shall be in accordance with specified key dis-
tribution methods.
CSP_204
If the VU accesses cryptographic keys, it shall be in accordance with specified crypto-
graphic keys access methods.
CSP_205
If the VU destroys cryptographic keys, it shall be in accordance with specified crypto-
graphic keys destruction methods.