3.4.5.1 Cryptographic Requirements

The cryptographic requirements common to all roles in this protocol are defined in section 3.1.1.1 in this document.