5.2 Cryptographic operation (FCS_COP)

Family behaviour

In order for a cryptographic operation to function correctly, the operation must be performed in accordance with a specified algorithm and with a cryptographic key of a specified size. This family should be included whenever there are requirements for cryptographic operations to be performed.

Typical cryptographic operations include data encryption and/or decryption, digital signature generation and/or verification, cryptographic checksum generation for integrity and/or verification of checksum, secure hash (message digest), cryptographic key encryption and/or decryption, and cryptographic key agreement.

Component levelling

FCS_COP.1 Cryptographic operation requires a cryptographic operation to be performed in accordance with a specified algorithm and with a cryptographic key of specified sizes. The specified algorithm and cryptographic key sizes can be based on an assigned standard.

Management: FCS_COP.1

There are no management activities foreseen for these components.

Audit: FCS_COP.1

The following actions should be auditable if FAU_GEN Security Audit Data Generation is included in the PP/ST:

a)    Minimal: Success and failure, and the type of cryptographic operation.

b)    Basic: Any applicable cryptographic mode(s) of operation, subject attributes and object attributes.