483
Table 25 List of power-up self-tests
Type Operations
Cryptographic algorithm
self-test
Tests the following algorithms:
• DSA (signature and authentication)
• RSA (signature and authentication)
• RSA (encryption and decryption)
• AES
• 3DES
• SHA1
• SHA256
• SHA512
• HMAC-SHA1
• Random number generator algorithms
Cryptographic engine self-test
Tests the following algorithms used by cryptographic engines:
• DSA (signature and authentication)
• RSA (signature and authentication)
• RSA (encryption and decryption)
• AES
• 3DES
• SHA1
• HMAC-SHA1
• Random number generator algorithms
Cryptographic card self-test
Tests the following algorithms used by cryptographic cards:
• AES
• 3DES
• SHA1
• HMAC-SHA1
Conditional self-tests
A conditional self-test runs when an asymmetrical cryptographic module or a random number
generator module is invoked. Conditional self-tests include the following types:
• Pair-wise consistency test—This test is run when a DSA/RSA asymmetrical key pair is
generated. It uses the public key to encrypt a plain text, and uses the private key to decrypt the
encrypted text. If the decryption is successful, the test succeeds. Otherwise, the test fails.
• Continuous random number generator test—This test is run when a random number is
generated. Each subsequent generation of a random number will be compared with the
previously generated number. The test fails if any two compared numbers are the same. This
test can also be run when a DSA/RSA asymmetrical key pair is generated.
Triggering self-tests
To examine whether the cryptography modules operate correctly, you can trigger a self-test on the
cryptographic algorithms. The triggered self-test is the same as the power-up self-test.
If the self-test fails, the device automatically reboots.
To trigger a self-test: