R2511-HP MSR Router Series Security Configuration Guide(V5)
494
Table 25 List of power-up self-tests
T
yp
e O
p
erations
Cryptographic algorithm
self-test
Tests the following algorithms:
• DSA (signature and authentication)
• RSA (signature and authentication)
• RSA (encryption and decryption)
• AES
• 3DES
• SHA1
• SHA256
• SHA512
• HMAC-SHA1
• Random number generator algorithms
Cryptographic engine self-test
Tests the following algorithms used by cryptographic engines:
• DSA (signature and authentication)
• RSA (signature and authentication)
• RSA (encryption and decryption)
• AES
• 3DES
• SHA1
• HMAC-SHA1
• Random number generator algorithms
Cryptographic card self-test
Tests the following algorithms used by cryptographic cards:
• AES
• 3DES
• SHA1
• HMAC-SHA1
Conditional self-tests
A conditional self-test runs when an asymmetrical cryptographic module or a random number generator
module is invoked. Conditional self-tests include the following types:
• Pair-wise consistency test—This test is run when a DSA/RSA asymmetrical key pair is generated. It
uses the public key to encrypt a plain text, and uses the private key to decrypt the encrypted text. If
the decryption is successful, the test succeeds. Otherwise, the test fails.
• Continuous random number generator test—This test is run when a random number is generated.
Each subsequent generation of a random number will be compared with the previously generated
number. The test fails if any two compared numbers are the same. This test can also be run when a
DSA/RSA asymmetrical key pair is generated.
Triggering self-tests
To examine whether the cryptography modules operate correctly, you can trigger a self-test on the
cryptographic algorithms. The triggered self-test is the same as the power-up self-test.
If the self-test fails, the device automatically reboots.










