background image
Preface
3
RSA BSAFE Crypto-J 4.1 Security Policy
1.2 Document Organization
This Security Policy document is one document in the FIPS 140-2 Validation
Submission package. With the exception of the Non-Proprietary Crypto-J Security
Policy, the FIPS 140-2 Validation Submission Documentation is RSA
Security-proprietary and is releasable only under appropriate non-disclosure
agreements. For access to the documentation, please contact RSA Security.
This document explains the Crypto-J features and functionality relevant to FIPS
140-2, and contains the following sections:
·
This section, "Preface" on page 2 provides an overview and introduction to the
Security Policy.
·
"Crypto-J Cryptographic Toolkit" on page 4, describes Crypto-J and how it meets
the FIPS 140-2 requirements.
·
"Secure Operation of Crypto-J" on page 19, addresses the required configuration
for the FIPS140-mode of operation.
·
"Acronyms" on page 23, lists the definitions for the acronyms used in this
document.
·
"Contacting RSA" on page 26, lists RSA contact information for RSA news and
information, product information, sales and service.