Module Name
RSA BSAFE® Crypto-C Micro Edition (ME)
Historical Reason
RNG SP800-131A Revision 1 Transition
Caveat
When operated in FIPS mode
Embodiment
Multi-chip standalone
Description
The Crypto-C Micro Edition (ME) Module is RSA Security Inc.'s cryptographic library designed for securing mobile devices like wireless phones and personal digital assistants. It contains assembly-level optimizations on key wireless processors. Its functionality includes a wide range of data encryption and signing algorithms, including Triple-DES, the Advanced Encryption Standard (AES) algorithm, the RSA Public Key Cryptosystem, the DSA government signature algorithm, MD5 and SHA1 message digest routines, and more.
Tested Configuration(s)
- AIX 5L v5.2 (32-bit PowerPC)
- AIX 5L v5.2 (64-bit PowerPC)
- AIX 5L v5.3 (32-bit PowerPC)
- AIX 5L v5.3 (64-bit PowerPC)
- HP-UX 11.11 PA-RISC 2.0 (32-bit)
- HP-UX 11.23 Itanium 2 (32-bit)
- HP-UX 11.23 Itanium 2 (64-bit)
- HP-UX 11.23 PA-RISC2.0W (64-bit)
- Red Hat Enterprise Linux AS 4.0 (32-bit x86)
- Red Hat Enterprise Linux AS 4.0 (64-bit x86_64)
- Solaris 10 (32-bit SPARC v8)
- Solaris 10 (32-bit SPARC v8+)
- Solaris 10 (64-bit SPARC v9)
- Solaris 10 (64-bit x86_64)
- SuSE Linux Enterprise Server 9.0 (32-bit x86)
- SuSE Linux Enterprise Server 9.0 (64-bit x86_64)
- VxWorks 5.4 (PPC 604)
- VxWorks 5.5 (PPC 603)
- VxWorks 5.5 (PPC 604)
- VxWorks General Purpose Platform 6.0 (PPC 604)
- Windows 2003 Server SP1 (32-bit x86 - VS8.0 build)
- Windows 2003 Server SP1 (64-bit x86_64)
- Windows 2003 Server SP1 (Itanium 2) (in single-user mode)
- Windows 2003 SP1 (32-bit x86 - VS6.0 build)
- Windows Mobile 2003
- Windows Mobile 2003 SE
- Windows Mobile 5.0 PocketPC
- Windows Mobile 5.0 PocketPC Phone Edition
Approved Algorithms
AES |
Cert. #490 |
DSA |
Cert. #199 |
ECDSA |
Cert. #47 |
HMAC |
Cert. #244 |
RNG |
Cert. #270 |
RSA |
Cert. #203 |
SHS |
Cert. #560 |
Triple-DES |
Cert. #501 |
Other Algorithms
MD2; MD5; HMAC MD5; DES; DES40; RC2; RC4; RC5; ECAES (non-compliant); ECDRBG (non-compliant); RSA (key wrapping; key establishment methodology provides at least 80 bits of encryption strength; non-compliant); Diffie-Hellman (key agreement; key establishment methodology provides at least 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 285 bits of encryption strength; non-compliant less than 112 bits of encryption strength)