Cc maker 1.2.1 mac
Furthermore, it must ensure that the seed is kept secret. The environment must provide a suitable seed for the random number generator.Note: The developer using the CC Core must strictly follow the instructions of the IAIK-JCE toolkit documentation and especially of this document. In order to reach Strength-of-Function high, the Developer must use the key sizes recommend in the manual. The developer uses the CC Core in the right way as described in the manual.Moreover, he must verify the CC Core’s integrity as described in the separate guidance document. Note: The administrator has to be able to set up the Java™ environment according to the requirements listed in this document. Please read also the note about blinding below. The environment must also protect the CC Core against side-channel attacks e.g. Only the application should have access to the CC Core.
#Cc maker 1.2.1 mac mac#
This includes input data, MAC values, hash values, signature values, cipher text, keys, random numbers and the seed of the random number generator. Note: In practice this means that you must ensure that no attacker can access the Java™ VM, the operating system or the host hardware in a manner that would enable him to read or modify keys or data managed by the CC Core. The CC Core and its environment are protected in such a way that it is impossible for an attacker to read or modify any data managed by the CC Core.The environment of the CC Core must meet the following criteria: To this end, the CC Core environment identifies and lists the assumptions made on the operational environment (including physical and procedural measures) and states the intended method of use of the product. The CC Core security environment describes the security aspects of the environment in which the CC Core is intended to be used and the manner in which it is expected to be employed.