Reference Guide

August 2019 Copyright © 2019 Dell Inc. or its subsidiaries. All rights reserved. 1
FIPS 140 Compliance Guide
18.07.19
RSA BSAFE
®
Crypto-J 6.2.5
FIPS 140 Compliance Guide
This document is a guide for users of RSA BSAFE Crypto-J 6.2.5 (Crypto-J) to
implement FIPS 140-2 compliant applications.
Federal Information Processing Standards Publication 140-2 - Security Requirements
for Cryptographic Modules (FIPS 140-2) details the U.S. Government requirements
for cryptographic modules. More information about the FIPS 140-2 standard and
validation program is available on the NIST Cryptographic Module Validation
Program website.
Contents:
Introduction ....................................................................................................... 2
How to Use Crypto-J in a FIPS 140-2 Compliant Way ............................... 3
Crypto-J Configuration ............................................................................. 4
Key and Critical Data Zeroization ........................................................... 4

Summary of content (4 pages)