Reference Guide

9 October 2014 Copyright © 2014 EMC Corporation. All rights reserved. Published in the USA. 1
Security Policy
09.10.14
RSA BSAFE
®
Crypto-C Micro Edition
Version 4.1
Security Policy Level 1 with Level 2 Roles, Services, and
Authentication
This is a non-proprietary Security Policy for RSA BSAFE Crypto-C Micro Edition 4.1
(Crypto-C ME).
It describes how Crypto-C ME meets the Level 2 security requirements
of FIPS 140-2 for roles, services and authentication, the Level 3 security requirements of
FIPS 140-2 for design assurance, and the Level 1 security requirements of FIPS 140-2
for all other aspects. It also describes how to securely operate Crypto-C ME in a
FIPS 140-2-compliant manner.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 - Security
Requirements for Cryptographic Modules) details the United States Government
requirements for cryptographic modules. For more information about the FIPS 140-2
standard and validation program, see the NIST website.
This document may be freely reproduced and distributed whole and intact including
the Copyright Notice.
Contents:
1 Introduction ................................................................................................... 2
1.1 References ......................................................................................... 2
1.2 Document Organization .................................................................... 2
2 Crypto-C ME Cryptographic Toolkit ........................................................... 3
2.1 Cryptographic Module ....................................................................... 3
2.2 Crypto-C ME Interfaces .................................................................. 12
2.3 Roles, Services, and Authentication ............................................. 14
2.4 Cryptographic Key Management ................................................... 17
2.5 Cryptographic Algorithms ............................................................... 20
2.6 Self Tests .......................................................................................... 22
3 Secure Operation of Crypto-C ME .......................................................... 24
3.1 Crypto Officer and Crypto User Guidance ................................... 24
3.2 Roles ................................................................................................. 25
3.3 Modes of Operation ......................................................................... 26
3.4 Operating Crypto-C ME .................................................................. 27
3.5 Startup Self-tests ............................................................................. 27
3.6 Pseudo-random Number Generator ............................................. 28
4 Services ...................................................................................................... 29
4.1 Authenticated Services ................................................................... 29
4.2 Unauthenticated Services .............................................................. 31
5 Acronyms and Definitions ......................................................................... 35

Summary of content (38 pages)