U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #3743

Details

Module Name
RSA BSAFEĀ® Crypto-C Micro Edition
Standard
FIPS 140-2
Status
Active
Sunset Date
11/15/2025
Validation Dates
11/16/2020;04/12/2021
Overall Level
1
Caveat
When operated in FIPS mode. When entropy is externally loaded, no assurance of the minimum strength of generated keys
Security Level Exceptions
  • Cryptographic Module Specification: Level 3
  • Physical Security: N/A
  • Design Assurance: Level 3
Module Type
Software
Embodiment
Multi-Chip Stand Alone
Description
The Crypto-C Micro Edition (ME) Module is RSA's cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more.
Tested Configuration(s)
  • AIX 6.1 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8284 - 22A (32-bit)
  • AIX 6.1 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8284 - 22A (64-bit)
  • AIX 7.2 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8231 - E2B (32-bit)
  • AIX 7.2 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8231 - E2B (64-bit)
  • Android 6.0 running on Google Nexus 5X with Qualcomm Snapdragon 808
  • Android 8.0 running on Google Pixel with Qualcomm Snapdragon 821
  • FreeBSD 11.2 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA
  • FreeBSD 11.2 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA
  • HP-UX 11.31 running on an HP 9000 rp3410 with HP PA-8800 (32-bit)
  • HP-UX 11.31 running on an HP 9000 rp3410 with HP PA-8800 (64-bit)
  • HP-UX 11.31 running on an HP Integrity RX2620 with Intel Itanium 2 (32-bit)
  • HP-UX 11.31 running on an HP Integrity RX2620 with Intel Itanium 2 (64-bit)
  • iOS 10 running on an iPhone 5C with Apple A6
  • iOS 11 running on an iPad Pro 9.7 with Apple A9X
  • macOS 10.12 on VMWare ESXi 6.0.0 running on a Mac Pro with Intel Xeon E5-1650 v2 with PAA
  • macOS 10.12 on VMWare ESXi 6.0.0 running on a Mac Pro with Intel Xeon E5-1650 v2 without PAA
  • macOS 10.13 on VMWare ESXi 6.0.0 running on a Mac Pro with Intel Xeon E5-1650 v2 with PAA
  • macOS 10.13 on VMWare ESXi 6.0.0 running on a Mac Pro with Intel Xeon E5-1650 v2 without PAA
  • Red Hat Enterprise Linux 5.8 on z/VM 6.0 running on an IBM zEnterprise 196 with IBM s390x (31-bit)
  • Red Hat Enterprise Linux 5.8 on z/VM 6.0 running on an IBM zEnterprise 196 with IBM s390x (64-bit)
  • Solaris 10 Update 11 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA
  • Solaris 11.4 running on a Solaris 11 LDOM on Oracle SPARC T4-2 (Sun C 5.13 32-bit v8+)
  • Solaris 11.4 running on a Solaris 11 LDOM on Oracle SPARC T4-2 (Sun C 5.13 64-bit v9)
  • Solaris 11.4 running on a Solaris 11 LDOM on Oracle SPARC T4-2 (Sun C 5.8 32-bit v8)
  • Solaris 11.4 running on a VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA
  • SUSE Linux Enterprise Server 11 SP4 on HP Integrity RX2600 with Intel Itanium 2 (64-bit)
  • SUSE Linux Enterprise Server 11 SP4 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8231 - E2B (32-bit)
  • SUSE Linux Enterprise Server 11 SP4 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8231 - E2B (64-bit)
  • SUSE Linux Enterprise Server 12 SP3 on PowerVM Virtual I/O Server 2.2.6.21 running on an IBM Power 8284 - 22A (64-bit)
  • SUSE Linux Enterprise Server 12 SP3 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (32-bit)
  • SUSE Linux Enterprise Server 12 SP3 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (64-bit)
  • SUSE Linux Enterprise Server 12 SP3 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (32-bit)
  • SUSE Linux Enterprise Server 12 SP3 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (64-bit)
  • SUSE Linux Enterprise Server 12 SP3 running on SoftIron Overdrive 1000 with ARM CORTEX A57 (AMD OPTERON A1100)
  • SUSE Linux Enterprise Server 15 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA
  • SUSE Linux Enterprise Server 15 on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA
  • Ubuntu 16.04 LTS running on a Beagle Bone Black with ARM Cortex A8
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (Visual Studio 2013 /MD)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (Visual Studio 2013 /MT)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (Visual Studio 2017 /MD)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 with PAA (Visual Studio 2017 /MT)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (Visual Studio 2013 /MD)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (Visual Studio 2013 /MT)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (Visual Studio 2017 /MD)
  • Windows 10 Enterprise on VMWare ESXi 6.0.0 running on a Dell R630 with Intel Xeon E5-2620 without PAA (Visual Studio 2017 /MT)
  • Windows 7 Enterprise SP1 (x64) on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2005 /MT)
  • Windows 7 Enterprise SP1 (x64) on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2005 /MT)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2005 /MD)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2005 /MT)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2010 /MD)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2010 /MT)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2005 /MD)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2005 /MT)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2010 /MD)
  • Windows 7 Enterprise SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2010 /MT)
  • Windows 8.1 Enterprise on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA
  • Windows 8.1 Enterprise on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA
  • Windows Server 2008 Enterprise R2 SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2005 /MD)
  • Windows Server 2008 Enterprise R2 SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2010 /MT)
  • Windows Server 2008 Enterprise R2 SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2005 /MD)
  • Windows Server 2008 Enterprise R2 SP1 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2010 /MT)
  • Windows Server 2008 Enterprise SP2 on HP Integrity RX2620 with Intel Itanium 2 (64-bit)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2010 /MD)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2013 /MD)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA (Visual Studio 2017 /MT)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2010 /MD)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2013 /MD)
  • Windows Server 2012 R2 Standard on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (Visual Studio 2017 /MT)
  • Windows Server 2016 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 with PAA
  • Windows Server 2016 on VMWare ESXi 6.0.0 running on a Cisco C220 M3 with Intel Xeon E5-2650 without PAA (single-user mode)
FIPS Algorithms
AES Cert. #C584
CKG vendor affirmed
CVL Cert. #C584
DRBG Cert. #C584
DSA Cert. #C584
ECDSA Cert. #C584
HMAC Cert. #C584
KAS Cert. #C584
KAS SP 800-56Arev2, vendor affirmed
KBKDF Cert. #C584
KDA vendor affirmed
KTS AES Cert. #C584; key establishment methodology provides between 128 and 256 bits of encryption strength
KTS vendor affirmed
PBKDF vendor affirmed
RSA Cert. #C584
SHA-3 Cert. #C584
SHS Cert. #C584
Triple-DES Cert. #C584
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 200 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
4.1.4

Vendor

RSA Security, LLC
174 Middlesex Turnpike
Bedford, MA 01730
USA

FIPS Program
fips-program@rsa.com
Phone: 781-515-5025
Francois Lamoureux
francois.lamoureux@dell.com
Phone: 781-515-5025

Lab

LEIDOS CSTL
NVLAP Code: 200427-0