Module Name
RSA BSAFE® Crypto-C Micro Edition
Caveat
When operated in FIPS mode. When entropy is externally loaded, no assurance of the minimum strength of generated keys
Security Level Exceptions
- Cryptographic Module Specification: Level 3
- Roles, Services, and Authentication: Level 2
- Physical Security: N/A
- Design Assurance: Level 3
Embodiment
Multi-Chip Stand Alone
Description
BSAFE Crypto-C Micro Edition is a software module providing a comprehensive set of cryptographic algorithms, including asymmetric key algorithms, symmetric key algorithms, message digests, message authentication, and deterministic random bit generator (DRBG) support. Developers can use the full set of algorithms through a single Application Programming Interface (API) or select a specific set of algorithms to reduce code size or meet performance requirements.
Tested Configuration(s)
- Apple iOS 12 ARMv8 (64-bit) running on an iPhone 8 with an Apple A11 with PAA
- Apple iOS 12 ARMv8 (64-bit) running on an iPhone 8 with an Apple A11 without PAA
- Apple macOS 10.15 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Mac Pro with an Intel Xeon E5-1650 v2 with PAA
- Apple macOS 10.15 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Mac Pro with an Intel Xeon E5-1650 v2 without PAA
- Canonical Ubuntu 16.04 ARMv7 (32-bit) running on a BeagleBoard BeagleBone Black with a Texas Instruments Sitara AM335x
- FreeBSD 11.3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- FreeBSD 11.3 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- Google Android 10 ARMv7 (32-bit) running on a Pixel 3 with Qualcomm Snapdragon 845
- Google Android 10 ARMv8 (64-bit) running on a Pixel 3 with Qualcomm Snapdragon 845 with PAA
- Google Android 10 ARMv8 (64-bit) running on a Pixel 3 with Qualcomm Snapdragon 845 without PAA (single-user mode)
- IBM AIX 7.2 PowerPC (32-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8
- IBM AIX 7.2 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8
- Microsoft Windows 10 Enterprise x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- Microsoft Windows 10 Enterprise x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA (VS2013)
- Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA (VS2017)
- Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA (VS2013)
- Microsoft Windows 10 Enterprise x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA (VS2017)
- Microsoft Windows Server 2016 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- Microsoft Windows Server 2016 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with AMD EPYC 7451 with PAA
- Microsoft Windows Server 2019 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R7425 with AMD EPYC 7451 without PAA
- Oracle Solaris 11.4 SPARC v8+ (32-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 with PAA
- Oracle Solaris 11.4 SPARC v8+ (32-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 without PAA
- Oracle Solaris 11.4 SPARC v9 (64-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 with PAA
- Oracle Solaris 11.4 SPARC v9 (64-bit) on Oracle VM Server 11 running on a Oracle SPARC T4-2 with a SPARC T4-2 without PAA
- Oracle Solaris 11.4 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- Oracle Solaris 11.4 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- Red Hat Enterprise Linux 7.8 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8
- SUSE Linux Enterprise Server 11 SP4 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8
- SUSE Linux Enterprise Server 12 SP5 ARMv8 (64-bit) running on a SoftIron Overdrive 1000 with an AMD Opteron A1100 with PAA
- SUSE Linux Enterprise Server 12 SP5 ARMv8 (64-bit) running on a SoftIron Overdrive 1000 with an AMD Opteron A1100 without PAA
- SUSE Linux Enterprise Server 12 SP5 PowerPC (64-bit) on PowerVM Virtual I/O Server 2.2.6.41 running on an IBM Power 8284-22A with an IBM POWER8
- SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- SUSE Linux Enterprise Server 12 SP5 x86 (32-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
- SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 with PAA
- SUSE Linux Enterprise Server 12 SP5 x86_64 (64-bit) on VMware ESXi 6.7.0 running on a Dell PowerEdge R640 with Intel Xeon Gold 6136 without PAA
Approved Algorithms
AES |
Cert. #C2130 |
CKG |
vendor affirmed |
CVL |
Cert. #C2130 |
DRBG |
Cert. #C2130 |
DSA |
Cert. #C2130 |
ECDSA |
Cert. #C2130 |
HMAC |
Cert. #C2130 |
KAS-SSC |
vendor affirmed |
KBKDF |
Cert. #C2130 |
KDA |
vendor affirmed |
KTS |
AES Cert. #C2130; key establishment methodology provides between 128 and 256 bits of encryption strength |
KTS |
vendor affirmed |
PBKDF |
vendor affirmed |
RSA |
Cert. #C2130 |
SHA-3 |
Cert. #C2130 |
SHS |
Cert. #C2130 |
Allowed Algorithms
MD5; NDRNG