intCertNum |
714 |
strVendorName |
RSA, The Security Division of EMC |
strURL |
http://www.rsa.com |
strAddress1 |
174 Middlesex Turnpike |
strAddress2 |
|
strAddress3 |
|
strCity |
Bedford |
strStateProv |
MA |
strPostalCode |
01730 |
strCountry |
01730 |
strContact |
Sandy Carielli |
strEmail |
sandra.carielli@rsa.com |
strPhone |
781-515-7510 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
714 |
strModuleName |
RSA BSAFE Crypto-J JCE Provider Module |
strPartNumber |
Software Versions: 3.5.2 [1] and 3.5.3 [2] |
memModuleNotes |
When operated in FIPS mode |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
http://www.rsasecurity.com/node.asp?id=1204&node_id= |
strModuleType |
Software |
strValidationDate |
11/02/2006;12/18/2006;10/12/2007;01/04/2008;10/16/2008;09/07/2010;03/28/2011;01/24/2013 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Operational Environment: Tested as meeting Level 1 with Windows XP Professional SP2 with Java JRE 1.4.2 (in single user mode). |
strFIPSAlgorithms |
DSA (Cert. #140); Triple-DES (Cert. #354); AES (Cert. #271); SHS (Cert. #356); RSA (Certs. #71 [1] and #186 [2]); RNG (Cert. #106); HMAC (Cert. #86) |
strOtherAlgorithms |
DES (Cert. #326); Diffie-Hellman (key agreement, key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DESX; MD2; MD5; RIPEMD 160; RNG (X9.31 non-compliant, MD5, SHA1); RC2; RC4; RC5; PBE (SHA256, SHA384, SHA512); Raw RSA; RSA Keypair Generation MultiPrime; RSA (key wrapping, key establishment methodology provides between 112 bits and 150 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-MD5 |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
RSA BSAFE Crypto-J security software is designed to help protect sensitive data as it is stored using strong encryption techniques to provide a persistent level of protection. RSA BSAFE Crypto-J supports a wide range of industry standard encryption algorithms offering Java developers the flexibility to choose the option most appropriate to meet their requirements. |
intModuleCount |
1 |
memAdditionalNotes |
12/18/06: Added software v3.5.3 and updated Secuirty Policy 10/12/07: Removed POC2 01/04/08: POC Change 10/16/08: URL Change 09/07/10: Updated Vendor Name, address and POC1. 03/28/11: Updated Vendor Address and Contact Info. 01/24/13: Updated contact information. |
strFirstValidtionDate |
11/02/06 00:00:00 |
strLabName |
Leidos |
strValidationYear |
2006 |