Reference Guide

4 The Cryptographic Module
RSA BSAFE Crypto-J JSAFE and JCE Software Module 6.2.5 Security Policy Level 1
1 The Cryptographic Module
This section provides an overview of the module, and contains the following topics:
Introduction
Module Characteristics
Module Interfaces
Roles and Services
Cryptographic Key Management
Cryptographic Algorithms
Self-tests.
1.1 Introduction
More than a billion copies of the RSA BSAFE technology are embedded in today's
most popular software applications and hardware devices. Encompassing one of the
most widely-used and rich set of cryptographic algorithms as well as secure
communications protocols, RSA BSAFE software is a set of complementary security
products relied on by developers and manufacturers worldwide.
The RSA BSAFE Crypto-J software library relies on the JCM library. It includes a
wide range of data encryption and signing algorithms, including AES, Triple-DES, the
RSA Public Key Cryptosystem, the Elliptic Curve Cryptosystem, DSA, and the SHA-
and SHA-3 message digest routines. Its software libraries, sample code and complete
standards-based implementation enable near-universal interoperability for your
networked and e-business applications.
1.2 Module Characteristics
The JCM is classified as a FIPS 140-2 multi-chip standalone module. As such, the
JCM is tested on particular operating systems and computer platforms. The
cryptographic boundary includes the JCM running on selected platforms that are
running selected operating systems.
The JCM is validated for FIPS 140-2 Security Level 1 requirements.