483 
Table 25 List of power-up self-tests 
Type Operations 
Cryptographic algorithm 
self-test 
Tests the following algorithms: 
•  DSA (signature and authentication) 
•  RSA (signature and authentication) 
•  RSA (encryption and decryption) 
• AES 
• 3DES 
• SHA1 
• SHA256 
• SHA512 
• HMAC-SHA1 
•  Random number generator algorithms 
Cryptographic engine self-test 
Tests the following algorithms used by cryptographic engines: 
•  DSA (signature and authentication) 
•  RSA (signature and authentication) 
•  RSA (encryption and decryption) 
• AES 
• 3DES 
• SHA1 
• HMAC-SHA1 
•  Random number generator algorithms 
Cryptographic card self-test 
Tests the following algorithms used by cryptographic cards: 
• AES 
• 3DES 
• SHA1 
• HMAC-SHA1 
 
Conditional self-tests 
A conditional self-test runs when an asymmetrical cryptographic module or a random number 
generator module is invoked. Conditional self-tests include the following types:  
•  Pair-wise consistency test—This test is run when a DSA/RSA asymmetrical key pair is 
generated. It uses the public key to encrypt a plain text, and uses the private key to decrypt the 
encrypted text. If the decryption is successful, the test succeeds. Otherwise, the test fails. 
•  Continuous random number generator test—This test is run when a random number is 
generated. Each subsequent generation of a random number will be compared with the 
previously generated number. The test fails if any two compared numbers are the same. This 
test can also be run when a DSA/RSA asymmetrical key pair is generated. 
Triggering self-tests 
To examine whether the cryptography modules operate correctly, you can trigger a self-test on the 
cryptographic algorithms. The triggered self-test is the same as the power-up self-test. 
If the self-test fails, the device automatically reboots. 
To trigger a self-test: