2.4.2 Cryptographic Requirements for Receivers

The following security requirements MUST be implemented by receivers: