Reference Guide

9 October 2014 Copyright © 2014 EMC Corporation. All rights reserved. Published in the USA. 1
Security Policy
09.10.14
RSA BSAFE
®
Crypto-C Micro Edition
Version 4.1
Security Policy Level 1
This is a non-proprietary Security Policy for RSA BSAFE Crypto-C Micro Edition 4.1
(Crypto-C ME). It describes how Crypto-C ME meets the Level 1 security requirements
of FIPS 140-2, the Level 3 security requirements of FIPS 140-2 for design assurance,
and how to securely operate Crypto-C ME in a FIPS 140-2-compliant manner. This
Security Policy is prepared as part of the FIPS 140-2 Level 1 validation of
Crypto-C ME.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 - Security
Requirements for Cryptographic Modules) details the United States Government
requirements for cryptographic modules. For more information about the FIPS 140-2
standard and validation program, see the NIST website.
This document may be freely reproduced and distributed whole and intact including
the Copyright Notice.
Contents:
1 Introduction ................................................................................................... 2
1.1 References ......................................................................................... 2
1.2 Document Organization .................................................................... 2
2 Crypto-C ME Cryptographic Toolkit ........................................................... 3
2.1 Cryptographic Module ....................................................................... 3
2.2 Crypto-C ME Interfaces .................................................................. 12
2.3 Roles and Services ......................................................................... 14
2.4 Cryptographic Key Management ................................................... 15
2.5 Cryptographic Algorithms ............................................................... 18
2.6 Self Tests .......................................................................................... 20
3 Secure Operation of Crypto-C ME .......................................................... 22
3.1 Crypto Officer and Crypto User Guidance ................................... 22
3.2 Roles ................................................................................................. 23
3.3 Modes of Operation ......................................................................... 24
3.4 Operating Crypto-C ME .................................................................. 25
3.5 Startup Self-tests ............................................................................. 25
3.6 Pseudo-random Number Generator ............................................. 26
4 Services ...................................................................................................... 27
5 Acronyms and Definitions ......................................................................... 33

Summary of content (36 pages)