Reference Guide

July 2019 Copyright © 2019 Dell Inc. or its subsidiaries. All rights reserved. 1
Security Policy
02.07.19
RSA BSAFE
®
Crypto-J JSAFE and JCE
Software Module 6.2.5 Security Policy Level 1
This document is a non-proprietary security policy for the RSA BSAFE Crypto-J
JSAFE and JCE Software Module 6.2.5 (Crypto-J JSAFE and JCE Software Module)
security software.
This document may be freely reproduced and distributed whole and intact including
the copyright notice.
Contents:
Preface ............................................................................................................ 2
References .............................................................................................. 2
Terminology ............................................................................................. 2
Document Organization ......................................................................... 3
1 The Cryptographic Module ......................................................................... 4
1.1 Introduction ......................................................................................... 4
1.2 Module Characteristics ..................................................................... 4
1.3 Module Interfaces .............................................................................. 9
1.4 Roles and Services ......................................................................... 10
1.5 Cryptographic Key Management ................................................... 20
1.6 Cryptographic Algorithms ...............................................................23
1.7 Self-tests ........................................................................................... 26
2 Secure Operation of the Module .............................................................. 28
2.1 Module Configuration ...................................................................... 28
2.2 Security Roles, Services and Authentication Operation ............ 28
2.3 Crypto User Guidance .................................................................... 29
2.4 Crypto Officer Guidance ................................................................. 36
2.5 Operating the Cryptographic Module ............................................ 37
3 Acronyms .................................................................................................... 38

Summary of content (42 pages)