background image
28 January 2010
© 2010 RSA Security Inc. All rights reserved.
1
Security Policy
N/A
28.01.10
RSA BSAFE Crypto-J 4.1 Security Policy
This document is a non-proprietary security policy for RSA BSAFE Crypto-J 4.1
(Crypto-J) security software.
This document may be freely reproduced and distributed whole and intact including
the Copyright Notice.
Contents:
1Preface .......................................................................................................... 2
1.1 References ......................................................................................... 2
1.2 Document Organization .................................................................... 3
2 Crypto-J Cryptographic Toolkit ................................................................... 4
2.1 Introduction ......................................................................................... 4
2.2 Toolkit Characteristics ....................................................................... 5
2.3 Toolkit Interfaces ................................................................................ 7
2.4 Roles and Services ........................................................................... 8
2.5 Cryptographic Key Management ................................................... 12
2.6 Cryptographic Algorithms ............................................................... 15
2.7 Self-tests ........................................................................................... 17
3 Secure Operation of Crypto-J .................................................................. 19
3.1 Crypto User Guidance .................................................................... 19
3.2 Crypto Officer Guidance ................................................................. 20
3.3 Role Changes .................................................................................. 20
3.4 Operating the Cryptographic Module ............................................ 20
3.5 Modes of Operation ......................................................................... 21
3.6 Startup Self Tests ............................................................................. 22
3.7 Random Number Generator .......................................................... 22
4 Acronyms .................................................................................................... 23
Contacting RSA ............................................................................................ 26
Support and Service ............................................................................. 26
Feedback ............................................................................................... 26