Reference Guide

July 2019 Copyright © 2019 Dell Inc. or its subsidiaries. All rights reserved. 1
Security Policy
02.07.19
RSA BSAFE
®
Crypto-J JSAFE and JCE
Software Module 6.2.5 Security Policy Level 1
with Level 2 Roles, Services and Authentication
This document is a non-proprietary security policy for the RSA BSAFE Crypto-J
JSAFE and JCE Software Module 6.2.5 (Crypto-J JSAFE and JCE Software Module)
security software.
This document may be freely reproduced and distributed whole and intact including
the copyright notice.
Contents:
Preface ............................................................................................................ 2
References .............................................................................................. 2
Terminology ............................................................................................. 2
Document Organization ......................................................................... 3
1 The Cryptographic Module ......................................................................... 4
1.1 Introduction ......................................................................................... 4
1.2 Module Characteristics ..................................................................... 4
1.3 Module Interfaces .............................................................................. 9
1.4 Roles, Services and Authentication .............................................. 10
1.5 Cryptographic Key Management ................................................... 21
1.6 Cryptographic Algorithms ...............................................................24
1.7 Self-tests ........................................................................................... 27
2 Secure Operation of the Module .............................................................. 29
2.1 Module Configuration ...................................................................... 29
2.2 Security Roles, Services and Authentication Operation ............ 30
2.3 Crypto User Guidance .................................................................... 30
2.4 Crypto Officer Guidance ................................................................. 38
2.5 Operating the Cryptographic Module ............................................ 39
3 Acronyms .................................................................................................... 40

Summary of content (44 pages)