Reference Guide

22 Crypto-C ME Cryptographic Toolkit
RSA BSAFE Crypto-C Micro Edition 4.1.4 Security Policy Level 1
with Level 2 Roles, Services and Authentication
1.4.5 Key Protection/Zeroization
All key data resides in internally allocated data structures and can be output only using
the Crypto-C ME API. The operating system protects memory and process space from
unauthorized access. The operator should follow the steps outlined in the RSA BSAFE
Crypto-C Micro Edition Developers Guide to ensure sensitive data is protected by
zeroizing the data from memory when it is no longer needed.
1.4.6 Key Wrapping
Crypto-C ME supports wrapping of raw key data, symmetric keys, and asymmetric
keys with:
Symmetric keys - AES KW and AES KWP algorithms.
Asymmetric keys - RSA-OAEP and RSA-KEM-KWS algorithms.