Security Target: V100R019C10 Huawei Optix RTN 900 Series Software Management Component
Security Target: V100R019C10 Huawei Optix RTN 900 Series Software Management Component
Security Target: V100R019C10 Huawei Optix RTN 900 Series Software Management Component
V100R019C10
Huawei OptiX RTN 900 Series Software Management
Component
Issue v2.0
Date 2020-11-25
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Purpose
This Security Target is for the evaluation of OptiX RTN 900 Series (905 2F/910A/950A)
software management component, consisting of unified transmission software (UTS). The
software is part of OptiX RTN 905 2F/ OptiX RTN 910A/ OptiX RTN 950A.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates an imminently hazardous situation which, if not
avoided, will result in death or serious injury.
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
Contents
1 Introduction
This Security Target is for the evaluation of OptiX RTN 900 Series (905 2F/910A/950A)
software management component, consisting of unified transmission software (UTS). The
software is part of OptiX RTN 905 2F/ OptiX RTN 910A/ OptiX RTN 950A.
1.1 ST Identification
Title: Security Target for Huawei OptiX RTN 900 Series Software Management Component
Version: v2.0
Date: 2020-11-25
Developer: Huawei Technologies Co., Ltd.
C version is the customized version developed based on the R version to fast meet
customer demands.
SPC version is the cold service patch version.
The TOE is part of the OptiX RTN 905 2F/910A/950A software which is the software running
on the OptiX RTN 905 2F/910A/950A device. The TOE only consists of the unified
transmission software (UTS) as described in the following chapters.
During the transmission, transmission equipment encapsulates client services into signals of
certain rates, performs error control, and monitors the quality of the signals. To achieve
transparent transmission, the transmission equipment does not process client services
transmitted from other equipment.
The non-TOE SW components include system and service attribute management, service
schedule and protect, optical Layer protocol, service warning and performance, service control
and monitor, and OS (Operation System).The non-TOE SW components are part of the RTN
900 Software package.
The UTS is responsible for managing and controlling the whole OptiX RTN 905
2F/910A/950A software, communication, and security features in OptiX RTN 905
2F/910A/950A.
To counter the security threats of OptiX RTN 905 2F/910A/950A, the TOE provides security
measures to mitigate security risks effectively. The main security features are:
1. Identification and authentication of administrative users
2. Authorization
3. Auditing
4. Communication Security
5. Management Traffic Flow Control
6. Security functionality management
The detailed description of above security features is in the chap.1.5.
Authorization
Authorization indicates that devices assign operation authorities to accounts according to their
validity.
The TOE controls access by the group-based authorization framework with predefined role
groups for management. Five hierarchical access groups are offered and can be assigned to
individual user accounts.
Only authenticated users can execute commands of the TOE. Only one user group level can
be assigned to a user account. So the user group level of a user is unambiguous at any time.
All authenticated users of the TOE are administrative users of some kind belonging to one of
the user groups defined below. There are no authenticated non-TOE administrative users.
Accounts are managed in groups and each group represents a specific authority assigned to
the accounts in the group. Table 1-2 lists the groups and their definition. For example, the
accounts of the "administrator" group are authorized to perform all security management and
advanced diagnosis operations. When an account is created, it is authorized to perform certain
operations and is not allowed to perform unauthorized operations. If an account attempts to
perform any unauthorized operation, an error message is displayed and the attempt is logged.
Both administrator and super administrator accounts belong to the administrator level and
both have the privilege to create other administrator or super administrator accounts. The
super administrator is a special administrator (expert role for equipment diagnoses and
maintenance) that can execute the debugging operations.
Group Authority
Monitor This group has the lowest authority. The accounts of this group
are authorized to issue query commands and modify some of their
own attributes.
Operator The accounts of this group are authorized to query the system
information and perform some configuration operations.
Group Authority
Maintenance The accounts of this group are authorized to perform all
maintenance operations, including the authority of Operator group
and general maintenance and diagnosis operations
Administrator The accounts of this group are used for security management and
are authorized to perform all query and configuration operations.
Especially, administrators can create super administrator account.
Super administrator The accounts in this group are authorized to perform all
operations of Administrator group and the advanced diagnosis
(debug) operation.
Note: user level in the following content is same as user group; in CC terminology, these are
considered roles.
Auditing
Logs record routine maintenance events of the TOE. Administrators can find security
vulnerabilities and risks by checking logs. Considering security, the TOE provides security
logs and operation logs.
Security logs record operation events related to account management, such as modification of
passwords and addition of accounts.
Operation logs record events related to system configurations, such as modification of
equipment IP addresses and addition of services.
The TOE provides a Syslog solution to resolve the problem of limited equipment storage
space. Both security logs and operation logs can be saved on an external Syslog server.
Communication Security
The TOE provides communication security by implementing the TLS protocol and the SFTP
protocol for different use cases.
For the secure communication between the TOE and the EMS the TLS protocol is used. TLS
version 1.2 are implemented. TLS certificates are required for establishing TLS encryption
channels. The TLS certificates are managed and issued by the user of the TOE (mainly
Internet Service Providers ('carriers')). SFTP (description as below) is used to load TLS
certificates onto TOE before establish TLS communications. The TOE acts as server during
the TLS communication established between the TOE and EMS, that is to say, the EMS will
validate the certificate from the TOE. The TOE does not provide path validation capabilities
for X.509 certificates.
The TOE provides an SFTP client for secure file downloading and uploading. Users can use
the SFTP client for fault collection, log uploading, and uploading and downloading of a file
and a database etc. In this application, the TOE serves as a client and the SFTP server is
deployed outside the equipment network and is provided by the carrier.
The SFTP authentication policy is determined by the SFTP server. The TOE supports
password authentication and key authentication. The password authentication indicates that an
SFTP client logs in to a server using an account name and a password. The key authentication
indicates that an SFTP server authenticates a client using the RSA key. For the key
authentication, users need to generate the RSA key on the TOE first and upload the public key
to the SFTP server. The length of the RSA key ranges from 2048 to 4096 bits and is specified
by users.
The TOE uses passphrases to protect private keys on an SFTP client for cryptographic
authentication. When users generate key pairs, they are allowed to indicate the passphrases.
Item Feature
Basic ACL Rules are defined based on the source IP address.
Advanced Rules are defined based on the source IP address of a data packet,
ACL destination IP address of a data packet, protocol type of the IP bearer
network, and protocol features. The protocol features include source port
of the TCP protocol, destination port of the TCP protocol, and ICMP
protocol type.
Cryptographic functions
The TOE does not offer cryptographic services, but uses cryptographic mechanisms in the
implementation of its communication security functions (TLS, SFTP) and I&A functions
(certificates, SFTP public key authentication).
Enabling/disabling trusted channels for local and remote access to the TOE’s
management interfaces
Management of ACLs and ACL attributes and parameters like IP addresses or address
ranges
Configuration of network addresses for services used by the TOE, like NTP, Syslog,
RADIUS, SFTP
Management of the TOE’s time
All security management functions (i.e. commands related to security management) require
sufficient user level for execution.
The environment for TOE comprises the following components as shown in figure 1-3:
Local PCs (WebLCT) used by administrators to connect to the TOE for access through
interfaces on SCC unit via a secure channel of TLS, or non-secure channel. Access will
be performed using a command line terminal.
Remote PCs used by administrators to connect to the TOE for access through interfaces on
SCC unit within the TOE via a secure channel of TLS.
EMS (Element Management System), it typically runs the U2000 rich user interface
management software.
SFTP Server is a light-weight high performance SSH File Server and make configuration
simple.
Radius server is optional and may be used instead of local authentication.
Syslog server is optional and is used for receiving audit information from the TOE via
SYSLOG protocol.
NTP server is used for synchronizing time to the TOE.
Physical networks, such as Ethernet subnets, interconnecting various networking devices.
OptiX RTN 900 Series (905 2F/910A/950A) hardware, firmware and non-TOE software,
include BIOS/OS/FPGA/CPLD of SCC board. The SCC board name of the 905 2F is
CSHP. The SCC board name of the 910A is CSHRF. The SCC board name of the 950A is
CSHOF.
EMS
SFTP (Element
server Management System)
Syslog server
DCN
Network Radius
server
NTP server
2 CC Conformance Claims
3.1 Asset
The assets to be protected are the information stored, processed or generated by the TOE.
Including below:
Step 1 Audit data: The data which is provided by the TOE during security audit logging
Step 2 Authentication data: The data which is used by the TOE to identify and authenticate the
external entities which interact with the TOE.
Step 3 Crypto data: All data used by the TOE for cryptographic operations like digital signature
handling and encryption or decryption purposes. This includes symmetric and
asymmetric cryptographic keys.
Step 4 Configuration data: The data for the TOE, which is used for configuration of security
feature and functions. This includes also data which is used by the TOE for system
software, patches update, and identity checking purposes.
Step 5 Management Traffic data, which is the management information exchanged between the
TOE and the EMS from authorized users.
3.2 Threats
This section specifies the threats that are addressed by the TOE and the TOE environment.
As a result, the following threats have been identified:
3.2.1 Threats
T.UnwantedManagementTraffic The traffic here only refers to the traffic on management
interfaces, that means, the Unwanted Network Traffic threat only exists on the management
plane. The Unwanted network traffic may originate from an attacker and result in an overload
of the management interfaces, which may cause a failure of the TOE to respond to system
control and normal management operations. As a consequence, the TOE might be unable to
provide some of the TSF while under attack and in particular security management
functionality to update configuration data for the TOE. Subsequently, backup of audit
information before local storage space is exceeded and old audit information is overwritten by
new audit events could be affected. Therefore, Audit data and Configuration data for the TOE
are assets that could be affected by this threat, too.
OSP.Accountability The users of the TOE shall be held accountable for their
security-relevant actions within the TOE.
3.4 Assumptions
This section specifies the assumptions on the TOE environment that are necessary for the
TOE to meet its security objectives.
A.Certificates It is assumed that digital certificates that are generated externally by trusted
certification authorities are of good quality i.e. meeting corresponding standards and
providing sufficient security strength through the use of appropriate cryptographic
mechanisms and cryptographic parameters. This applies for the cryptographic mechanisms
and parameters contained in the certificate and as well for the mechanisms and parameters
used to sign the certificate. It is assumed that administrators examine the quality of the
certificates besides verifying the integrity and authenticity before importing them. Especially
certificates signed with weak hashing algorithms are assumed to be not imported into the
TOE.
A.PhysicalProtection It is assumed that the TOE and its operational environment (i.e. the
complete system including attached peripherals) are protected against unauthorized physical
access. It is assumed that only administrators (i.e. all users who could successfully
authenticate to the TOE) are authorized to physically access the TOE and its operational
environment. This assumption includes that the local management network, including the
RADIUS server, syslog server, NTP server, SFTP servers and locally attached management
terminals (LMT) together with all related communication lines are operated in the same
physically secured environment as the TOE. Remote management terminals (RMTs) need to
be physically protected on the same level as the TOE but they do not necessarily have to be
kept in the same physical environment. The communication lines between any RMT and the
TOE are protected by cryptographic means and do not need any physical protection. It is
assumed that all RMTs as well as peripherals like RADIUS server, NTP server, SFTP servers
or syslog server are connected to the TOE via the same segregated management network (see
also A.NetworkSegregation). As a result, it can be assumed that the TOE and its operational
environment are physically protected and are not subject to physical attacks.
A.NetworkElements It is assumed that the operational environment provides securely and
correctly working network devices as resources that the TOE needs to cooperate with.
Behaviors of such network devices provided by operational environment shall be also secure
and correct. These network devices are deployed in an independent network which is
segregated from other network by VPN or firewall or other methods. Examples of such
devices are:
Peer router(s) for the exchange of dynamic routing information;
Local and remote management terminals (WebLCT, EMS) used for administration of
the TOE.
RADIUS servers for obtaining authentication and authorization decisions.
SYSLOG servers for receiving and storing audit data.
NTP servers.
trained for proper operation of the TOE. These administrative users will be competent, and
not careless or willfully negligent or hostile, and will follow and abide by the instructions
provided by the TOE documentation.
A.Device It is assumed that the underlying hardware of OptiX RTN 905 2F/910A/950A,
which is outside the scope of the TOE, as well as the firmware and the underlying OS and
non-TOE software, are trusted and works correctly.
A.UpToDateClient It is assumed that the user uses a secure remote management terminal for
remote administration of the TOE which is up to date with respect to supported cryptographic
algorithms and security measures.
4 Security Objectives
level as the TOE but they do not necessarily have to be kept in the same physical
environment. The communication lines between any RMT and the TOE are protected by
cryptographic means and do not need any physically protection. All RMTs as well as
peripherals like RADIUS server, NTP server, SFTP server or syslog server shall be
connected to the TOE via the same segregated management network (see also
OE.NetworkSegregation). As a result, the TOE and its operational environment shall be
physically protected and shall not be subject to physical attacks.
OE.NetworkElements The operational environment shall provide securely and correctly
working network devices as resources that the TOE needs to cooperate with. The
behavior of such network devices provided by the operational environment shall be
secure and correct. This applies e.g. to LMTs and EMS used for TOE management,
Syslog servers, SFTP servers, NTP servers and Radius servers for obtaining
authentication and authorization decisions.
OE.NetworkSegregation The operational environment shall provide segregation of
networks by deploying the management interface in TOE into an independent local
network.
OE.NoEvil Personnel working as authorized administrators (i.e. all users that can
successfully authenticate to the TOE) shall be carefully selected for trustworthiness and
trained for proper operation of the TOE. These administrative users shall be competent,
and not careless or willfully negligent or hostile, and shall follow and abide by the
instructions provided by the TOE documentation. All user management and permission
management are implemented in the TOE.
OE.Device The underlying hardware of OptiX RTN 905 2F/910A/950A, which is
outside the scope of the TOE, as well as the firmware and non-TOE software, shall work
correctly.
OE.UpToDateClient The user shall use a secure remote management terminal for
remote administration of the TOE which is up to date with respect to supported
cryptographic algorithms and security measures.
The following table provides a mapping of the objectives for the operational environment to
assumptions, showing that each objective is covered exactly by one assumption. The
objectives for the environment are mirrored by the assumptions. Therefore, the mapping is
trivial in Table 4-2.
A. Certificates is upheld by OE.Certificates, which is a rephrasing of the assumption.
5.1 Conventions
The following conventions are used for the completion of operations:
Iteration/Identifier indicates an element of the iteration, where Identifier distinguishes the different
iterations.
User ID, then the event shall be audited and the audit information shall contain the User ID. If
the event cannot be associated with the User ID, the event shall be audited and the audit
information shall not contain User ID information. If multiple conditional information can be
associated with an event (e.g. interface and User ID can be associated with an event), all the
conditional information shall be contained in the audit information when auditing the event.
Role Authority
Monitor This group has the lowest authority. The accounts of
this group are authorized to issue query commands and
modify their own attributes.
Operator The accounts of this group are authorized to query the
system information and perform non-SFRs
configuration operations.
Maintenance The accounts of this group are authorized to perform all
maintenance operations, including the authority of
Operator group and general maintenance and diagnosis
operations
Administrator The accounts of this group are used for security
management and are authorized to perform all query
and configuration operations. Especially, administrators
can create super administrator account.
Super administrator The accounts in this group are authorized to perform all
operations of Administrator group and the advanced
diagnosis (debug) operation.
Application Note: The roles are hierarchical, i.e. each role includes all authorities of the
previous roles in addition to the authorities described for the role itself.
FMT_SMR.1.2 The TSF shall be able to associate users with roles.
For SSH/SFTP-based communications the following algorithms and ciphers are supported:
Authentication can be performed either public key-based or password-based as
described in [RFC 4252].
Key exchange is performed using diffie-hellman-group14-sha1
The public key algorithm of the SSH transport implementation is ssh-rsa.
For data encryption AES128-CTR, AES192-CTR and AES256-CTR are supported.
For data integrity protection HMAC-SHA1 is supported.
O.SecurityManagement
FMT_MSA.1/ACFATD O.Authorization
O.SecurityManagement
FMT_MSA.1/IFF O.Authorization
O.DataFilter
O.SecurityManagement
FMT_MSA.3/ACFATD O.Authorization
O.SecurityManagement
FMT_MSA.3/IFF O.Authorization
O.DataFilter
O.SecurityManagement
FMT_SMF.1 O.Authorization
O.SecurityManagement
O.DataFilter
FMT_SMR.1 O.Authorization
O.SecurityManagement
FTA_SSL.3 O.Authentication
O.Communication
FTA_TSE.1 O.DataFilter
O.Authentication
O.Communication
FTP_ITC.1/TLS O.Authentication
O.Communication
FTP_ITC.1/SFTP O.Authentication
O.Communication
5.3.2 Sufficiency
As shown Table 5-2 provides justification for each security objective for the TOE, showing
that the security functional requirements are suitable to meet and achieve the security
objectives:
Dependencies within the EAL package selected (EAL3) for the security assurance require-
ments have been considered by the authors of CC Part 3 and are therefore not analyzed here.
The augmentation by ALC_FLR.2 does not cause any additional dependencies.
This chapter identifies and describes how the Security Functional Requirements identified
above are met by the TOE.
6.1 Authentication
The TOE can identify users based on unique IDs and enforce their authentication before
granting them access to any TSF management interfaces. Detailed functions include:
Support authentication via local passwords. This function is achieved by comparing user
information input with pre-defined user information stored in the flash. Passwords have a
length of 16 characters. The TOE enforces a password complexity policy of at least
contains three types of the following character types: capital letter, small letter, number,
and special character.
Support authentication via the remote RADIUS authentication server. The TOE hands
identification and authentication information provided by the user during login to the
RADIUS server and enforces the RADIUS server’s pass/fail decision.
Support authenticated user logins using the TLS mode.
Support logout when no operation is performed on the user session within a specified
interval. If an account that has logged in does not exchange information with the TOE
within the specified interval, it will be automatically logged out. The account needs to be
authenticated again for a new login. By default, the inactivity period is 60 minutes.
Support maximum attempts for authentication failures within certain period of time. By
default, after five consecutive login attempts using one account fail and the interval
between two attempts is shorter than 3 minutes, the account is locked. An alarm is
reported after the account is locked. The default value of lock period is 15 minutes, the
configurable range is between 1 and 1000 minutes. So the user account will be
automatically unlocked after 15 minutes by default.
Support access limit by IP-based ACL. A series of whitelists and blacklists are set to
filter IP addresses and data on ports. Unauthorized IP addresses and communication
ports cannot access the system.
Support for user individual attributes including the user ID, user level, and password to
ensure that each user is unique in the system. Both the user ID and password have a
validity period, the user cannot log in to the system If the validity period expires.
Using the SFTP application requires Administrator users to unlock the private RSA key
for SFTP first with the key’s passphrase. When the key is generated, the Administrator is
6.2 Authorization
The TOE enforces an access control by supporting following functions in Table 6-2:
There are five hierarchical user groups (from low to high): monitor, operator,
maintenance, administrator and super administrator.
A user group is assigned to each account.
Accounts are managed in groups. When an account is created, it is authorized to perform
certain operations and is not allowed to perform unauthorized operations. If an account is
used to attempt any unauthorized operation, an error message is displayed and the
attempt is audited. The authority of each user group is specified in Table 6-2.
Every management command has a command level associated to it. A user can use this
command if his user level dominates the command level, i.e., if his user level is
hierarchically equal or higher than the command level. User groups match to command
levels as follows:
FDP_ACF.1, There are five hierarchical user groups (from low to high):
FIA_ATD.1, monitor, operator, maintenance, administrator and super
FIA_UID.2 administrator.
A user group is assigned to each account.
Accounts are managed in groups. When an account is
created, it is authorized to perform certain operations and is
not allowed to perform unauthorized operations. If an
account is used to attempt any unauthorized operation, an
error message is displayed and the attempt is audited. The
authority of each user group is specified in table 6-2.
Every management command has a command level
associated to it. A user can use this command if his user
level dominates the command level, i.e., if his user level is
hierarchically equal or higher than the command level.
User groups match to command levels as follows:
Both administrator and super administrator accounts
belong to the administrator level and both have the
privilege to create other administrator or super
administrator accounts. The super administrator is a special
administrator (expert role for equipment diagnoses and
maintenance) that can execute the debugging commands.
Only Administrators and Super administrators can query
and dump operation logs and security logs.
FMT_MOF.1 Accounts are managed in groups. When an account is
created, it is authorized to perform certain operations and is
not allowed to perform unauthorized operations. If an
account is used to attempt any unauthorized operation, an
error message is displayed and the attempt is audited. The
authority of each user group is specified in table 6-2.
Every management command has a command level
associated to it. A user can use this command if his user
level dominates the command level, i.e., if his user level is
hierarchically equal or higher than the command level.
User groups match to command levels as follows:
Both administrator and super administrator accounts
belong to the administrator level and both have the
privilege to create other administrator or super
administrator accounts. The super administrator is a special
administrator (expert role for equipment diagnoses and
maintenance) that can execute the debugging commands.
Only Administrators and Super administrators can query
and dump operation logs and security logs.
FMT_MSA.1/ACFATD Accounts are managed in groups. When an account is
FMT_MSA.1/IFF created, it is authorized to perform certain operations and is
not allowed to perform unauthorized operations. If an
FMT_MSA.3/ACFATD account is used to attempt any unauthorized operation, an
FMT_MSA.3/IFF error message is displayed and the attempt is audited. The
FMT_SMF.1 authority of each user group is specified in table 6-2.
Every management command has a command level
associated to it. A user can use this command if his user
level dominates the command level, i.e., if his user level is
6.3 Auditing
The TOE provides an audit trail consisting of operation logs and security logs:
Support recording non-query operations in the operation logs, including the operation
type (if applicable), operation object (if applicable), access IP address (if applicable),
date and time, the outcome, and user name (if applicable).
Support recording security-related configuration operations in the security logs,
including user management, security settings, and the attempts of unauthorized
operations. The security logs provide the information about the account name, address of
the client, date and time, operation, and outcome.
For all audit events the corresponding timestamp will be recorded together with the
event.
Only Administrators and Super administrators can query and dump operation logs and
security logs, and the Administrators and Super administrators can know that whoever
accesses and logins the system and any operation on the system according to the content
of the security log and the operation log.
The operation logs and security logs allow no manual changes.
The operation logs and security logs can be completely recovered even after a
power-outage restart of the system.
The operation logs and security logs keep records in time sequence. After the memory is
exhausted, the earliest records of the logs are overwritten by the latest records. Once the
memory is exhausted, a performance event is reported.
Support for user individual attributes including the user ID ensures that each user is
unique in the system and that user-related audit events can be attributed to a user.
14-sha1
The public key algorithm of the SSH transport
implementation is ssh-rsa.
For data encryption AES128-CTR, AES192-CTR and
AES256-CTR are supported.
For data integrity protection HMAC-SHA1 is supported.
6.7 Time
The TOE provides its own clock and timestamps to correctly record logs in time sequence or
other place wherever the time shall be used. The time information on the TOE can either be
set by a user with sufficient access rights on the device or obtained from external NTP servers.
A.1 Abbreviations
CC Common Criteria
DCN Data Communications Network (the management network)
EMS Element Management System
LCT Local Craft Terminal
LMT Local Maintenance Terminal
MSTP Multi-Service Transmission Platform
RTN Radio Transmission Node
OTN Optical Transport Network
PP Protection Profile
RADIUS Remote Authentication Dial-In User Service
RMT Remote Maintenance Terminal
RSA Rivest Shamir Adleman
SDH Synchronous Digital Hierarchy
SFR Security Functional Requirement
SFTP Secure File Transfer Protocol
SSH Secure Shell
ST Security Target
TLS Transport Layer Security
TOE Target of Evaluation
TSF TOE Security Functions
A.2 Terminology
This section contains definitions of technical terms that are used with a meaning specific to
this document. Terms defined in the [CC] are not reiterated here, unless stated otherwise.
Administrator: An administrator in the content is the user of administrator group or super
administrator group
User: A user is a human or a product/application using the TOE.
A.3 References
[CC] Common Criteria for Information Technology Security Evaluation, Part
1-3, Version 3.1 Revision 5, April 2017
[CEM] Common Methodology for Information Technology Security Evaluation,
Evaluation methodology, Version 3.1 Revision 5, April 2017
[AIS20] Functionality Classes and Evaluation Methodology for Deterministic
Random Number Generators, Version 2.0, 2 December 1999
[FIPS 180-4] FIPS PUB 180-4 – Secure Hash Standard (SHS)
[FIPS 186-4] FIPS PUB 186-4 – Digital Signature Standard (DSS), July 2013
[FIPS 197] FIPS PUB 197 – Advanced Encryption Standard (AES), November 26,
2001
[FIPS 198-1] FIPS PUB 198-1 - The Keyed-Hash Message Authentication Code
(HMAC), July 2008
[NIST SP800-38A] NIST Special Publication 800-38A – Recommendation for Block
Cipher Modes of Operation: Methods and Techniques, December 2001
[NIST SP800-38D] NIST Special Publication 800-38D – Recommendation for Block
Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC,
November 2007
[NIST SP800-56A] NIST Special Publication 800-56A Rev. 3 – Recommendation for
Pair-Wise Key Establishment Schemes Using Discrete Logarithm
Cryptography, April 2018
[NIST SP800-56B] NIST Special Publication 800-56B Rev. 2 – Recommendation for
Pair-Wise Key-Establishment Schemes Using Integer Factorization
Cryptography, July 2018
[NIST SP800-90A] NIST Special Publication 800-90A Rev. 1 - Recommendation for
Random Number Generation Using Deterministic Random Bit
Generators, June 2015
[PKCS#1 V2.1] PKCS #1 v2.1: RSA Cryptography Standard, April 2004
[PKCS#3] PKCS #3: Diffie-Hellman Key- Agreement Standard, version 1.4,
November 1993
[RFC 1321] The MD5 Message-Digest Algorithm, R. Rivest, April 1992
[RFC 2104] RFC 2104 - HMAC: Keyed-Hashing for Message Authentication,
February 1997
[RFC 3268] Advanced Encryption Standard (AES) Ciphersuites for Transport Layer
Security (TLS), P. Chown, June 2002
[RFC 3447] Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography
Specifications, Version 2.1, J. Jonsson, B. Kaliski, 2003-02-01
[RFC 3526] RFC 3526 - More Modular Exponential (MODP) Diffie-Hellman
groups for Internet Key Exchange (IKE), May 2003
[RFC 4251] RFC 4251 – The Secure Shell (SSH) Protocol Architecture, January
2006
[RFC 4252] RFC 4252 - The Secure Shell (SSH) Authentication Protocol, January
2006
[RFC 4253] RFC 4253 - The Secure Shell (SSH) Transport Layer Protocol, January
2006
[RFC 4254] RFC 4254 - The Secure Shell (SSH) Connection Protocol, January 2006
[RFC 4344] The Secure Shell (SSH) Transport Layer Encryption Modes, M. Bellare,
T. Kohno, C. Namprempre, 2006-01-01
[RFC 4346] RFC 4346 - The Transport Layer Security (TLS) Protocol Version 1.1,
April 2006
[RFC 5246] RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2,
August 2008
[RFC 5288] AES Galois Counter Mode (GCM) Cipher suited for TLS, J. Salowey, A.
Choudhury, D. McGrew 2008-08-01
[RFC 5289] TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois
Counter Mode (GCM), August 2008
[RFC 8439] ChaCha20 and Poly1305 for IETF Protocols, June 2018
[RFC 6655] AES-CCM Cipher Suites for Transport Layer Security (TLS), July
2012
[RFC 5116] An Interface and Algorithms for Authenticated Encryption, January
2008
[RFC 8018] PKCS #5: Password-Based Cryptography Specification Verion 2.1, B.
Kaliski, 2017-01-01