Power-Up Self-Tests; Conditional Self-Tests - HPE Moonshot 45Gc Security Configuration Manual

Switch module
Table of Contents

Advertisement

NOTE:
If a self-test fails, contact Hewlett Packard Enterprise Support.

Power-up self-tests

Power-up self-tests include the following types:
Known-answer test (KAT)
This test examines the availability of FIPS-allowed cryptographic algorithms. A cryptographic
algorithm is run on data for which the correct output is already known. The calculated output is
compared with the known answer. If they are not identical, the KAT test fails.
Pairwise conditional test (PWCT)
Signature and authentication test—The test is run when a DSA, RSA, or ECDSA
asymmetrical key pair is generated. It uses the private key to sign the specific data, and it
then uses the public key to authenticate the signed data. If the authentication is successful,
the test succeeds.
Encryption and decryption test—The test is run when an RSA asymmetrical key pair is
generated. It uses the public key to encrypt a plain text, and it then uses the private key to
decrypt the encrypted text. If the decryption is successful, the test succeeds.
Table 21
lists the cryptographic algorithms examined by the power-up self-test.
Table 21 Power-up self-test list
Type
KAT
PWCT

Conditional self-tests

A conditional self-test runs when an asymmetrical cryptographic module or a random number
generator module is invoked. Conditional self-tests include the following types:
Pairwise conditional test (PWCT) signature and authentication—The test is run when a
DSA or RSA asymmetrical key pair is generated. It uses the private key to sign the specific data,
and it then uses the public key to authenticate the signed data. If the authentication is
successful, the test succeeds.
Operations
Tests the following algorithms:
3DES.
SHA1, SHA224, SHA256, SHA384, and SHA512.
HMAC-SHA1, HMAC-SHA224, HMAC-SHA256, HMAC-SHA384,
and HMAC-SHA512.
AES.
RSA (signature and authentication).
ECDH.
RNG.
DRBG.
GCM.
GMAC.
Tests the following algorithms:
RSA (signature and authentication).
RSA (encryption and decryption).
DSA (signature and authentication).
ECDSA (signature and authentication).
440

Advertisement

Table of Contents
loading

Table of Contents