intCertNum |
595 |
strVendorName |
RSA, The Security Division of EMC |
strURL |
http://www.rsa.com |
strAddress1 |
174 Middlesex Turnpike |
strAddress2 |
|
strAddress3 |
|
strCity |
Bedford |
strStateProv |
MA |
strPostalCode |
01730 |
strCountry |
01730 |
strContact |
Sandy Carielli |
strEmail |
sandra.carielli@rsa.com |
strPhone |
781-515-7510 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
595 |
strModuleName |
RSA BSAFE Crypto-J JCE Provider Module |
strPartNumber |
Software Version: 3.5 |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
http://www.rsasecurity.com/node.asp?id=1204&node_id= |
strModuleType |
Software |
strValidationDate |
12/01/2005;03/06/2006;10/12/2007;01/04/2008;10/16/2008;09/07/2010;03/28/2011;01/24/2013 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Operational Environment: Tested as meeting Level 1 with Windows XP Professional SP2 with Java JRE 1.4.2 (in single user mode) |
strFIPSAlgorithms |
DSA (Cert. #140); Triple-DES (Cert. #354); AES (Cert. #271); SHS (Cert. #356); RSA (Cert. #71); RNG (Cert. #106); HMAC (Cert. #86) |
strOtherAlgorithms |
DES (Cert. #326); Diffie-Hellman (key agreement, key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DESX; MD2; MD5; RIPEMD 160; RNG (ANSI X9.31, MD5, SHA1; non-compliant); RC2; RC4; RC5; PBE (SHA256, SHA384, SHA512); Raw RSA; RSA Keypair Generation MultiPrime; RSA (key wrapping, key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-MD5 |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. RSA BSAFE Crypto-J supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements. |
intModuleCount |
1 |
memAdditionalNotes |
03/06/2006: Updated Security Policy 10/12/07: Removed POC2 01/04/08: POC Change 10/16/08: URL Change 09/07/10: Updated Vendor Name, address and POC1. 03/28/11: Updated Vendor Address and Contact Info. 01/24/13: Updated contact information. |
strFirstValidtionDate |
12/01/05 00:00:00 |
strLabName |
Leidos |
strValidationYear |
2005 |