Module Name
RSA BSAFEĀ® Crypto-C Micro Edition
Validation Dates
12/12/2014;12/21/2015;01/19/2016;01/22/2016;02/12/2016;01/18/2017;08/11/2017;01/29/2018;07/19/2019
Caveat
When operated in FIPS mode. When entropy is externally loaded, no assurance of the minimum strength of generated keys
Security Level Exceptions
- Cryptographic Module Specification: Level 3
- Physical Security: N/A
- Design Assurance: Level 3
Embodiment
Multi-chip standalone
Description
The Crypto-C Micro Edition (ME) Module is RSA, The Security Division of EMC's cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more.
FIPS Algorithms
AES |
Certs. #2859 [1], #3596 [3], #3767 [2], #4665 [5] and #C810 [4] |
CVL |
Certs. #296 [1], #297 [1], #298 [1], #299 [1], #300 [1], #618 [3], #619 [3], #620 [3], #621 [3], #622 [3], #714 [2], #715 [2], #716 [2], #717 [2], #740 [2], #1311 [5], #1314 [5], #1315 [5], #1316 [5], #1317 [5] and #C810 [4] |
DRBG |
Certs. #507 [1], #931 [3], #1037 [2], #1577 [5] and #C810 [4] |
DSA |
Certs. #858 [1], #999 [3], #1047 [2], #1236 [5] and #C810 [4] |
ECDSA |
Certs. #507 [1], #733 [3], #810 [2], #1149 [5] and #C810 [4] |
HMAC |
Certs. #1799 [1], #2293 [3], #2467 [2], #3089 [5] and #C810 [4] |
KTS |
AES Certs. #3596 [3], #4665 [5] and #C810 [4]; key establishment methodology provides between 128 and 256 bits of encryption strength |
PBKDF |
vendor affirmed |
RSA |
Certs. #1499 [1], #1850 [3], #1938 [2], #2545 [5] and #C810 [4] |
SHS |
Certs. #2402 [1], #2958 [3], #3137 [2], #3822 [5] and #C810 [4] |
Triple-DES |
Certs. #1706 [1], #2003 [3], #2095 [2], #2482 [5] and #C810 [4] |
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 150 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); HMAC-MD5; MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 150 bits of encryption strength)
Software Versions
4.1 [1], 4.1.0.1 [2], 4.1.2 [3], 4.1.2.2 [4] and 4.1.3.2 [5]