Cisco 7609-S User Guide - Page 20

Self-Tests

Page 20 highlights

DRBG V SP 800‐90 Diffie DH Hellman shared secret Diffie DH Hellman private exponent SSH keys/CSPs 256‐bits This is the seed key for generated from SP 800‐90 DRBG. entropy source via the CTR_DRBG derivation function 1024‐4096 bits This is the shared N/A secret agreed upon as part of DH exchange DRAM (plaintext) DRAM (plaintext) 1024‐4096 bits The private exponent Generated using FIPS DRAM used in Diffie‐Hellman approved DRBG (plaintext) (DH) exchange. power cycle the device Zeroized upon deletion Automatically after shared secret generated. SSH Private key SSH session key RSA Triple‐ DES/AES 1024‐2048 bits This is the SSH private key used to authenticate the module Generated or NVRAM entered like any RSA (plaintext) key 3‐key Triple‐ DES 128/192/256 bits AES keys This is the symmetric SSH key used to protect SSH session Created as part of SSH session set‐up DRAM (plaintext) Zeroized by either deletion (via # crypto key zeroize rsa) or by overwriting with a new value of the key Zeroized automatically when SSH session is closed Table 8 Cryptographic Keys and CSPs 2.7 Self-Tests In order to prevent any secure data from being released, it is important to test the cryptographic components of a security module to insure all components are functioning correctly. The router includes an array of self-tests that are run during startup and periodically during operations. 2.7.1 Self-tests performed by the IOS image • IOS Self Tests o POST tests ƒ AES Known Answer Test ƒ RSA Signature Known Answer Test (both signature/verification) ƒ Software/firmware test © Copyright 2011 Cisco Systems, Inc. 20 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22

© Copyright 2011 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
20
DRBG V
SP 800
90
256
bits
This is the seed key for
SP 800
90 DRBG.
generated from
entropy source via
the CTR_DRBG
derivation function
DRAM
(plaintext)
power cycle
the device
Diffie
Hellman
shared
secret
DH
1024
4096 bits
This is the shared
secret agreed upon as
part of DH exchange
N/A
DRAM
(plaintext)
Zeroized upon
deletion
Diffie
Hellman
private
exponent
DH
1024
4096 bits
The private exponent
used in Diffie
Hellman
(DH) exchange.
Generated using FIPS
approved DRBG
DRAM
(plaintext)
Automatically
after shared
secret
generated.
SSH keys/CSPs
SSH
Private
key
RSA
1024
2048 bits
This is the SSH private
key used to
authenticate the
module
Generated or
entered like any RSA
key
NVRAM
(plaintext)
Zeroized by
either deletion
(via # crypto
key zeroize
rsa) or by
overwriting
with a new
value of the
key
SSH
session
key
Triple
DES/AES
3
key Triple
DES
128/192/256
bits AES keys
This is the symmetric
SSH key used to
protect SSH session
Created as part of
SSH session set
up
DRAM
(plaintext)
Zeroized
automatically
when SSH
session is
closed
Table 8 Cryptographic Keys and CSPs
2.7
Self-Tests
In order to prevent any secure data from being released, it is important to test the cryptographic
components of a security module to insure all components are functioning correctly. The router
includes an array of self-tests that are run during startup and periodically during operations.
2.7.1
Self-tests performed by the IOS image
IOS Self Tests
o
POST tests
±
AES Known Answer Test
±
RSA Signature Known Answer Test (both signature/verification)
±
Software/firmware test