IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf

上传人:孙刚 文档编号:1242119 上传时间:2019-08-25 格式:PDF 页数:120 大小:2MB
下载 相关 举报
IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf_第1页
第1页 / 共120页
IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf_第2页
第2页 / 共120页
IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf_第3页
第3页 / 共120页
IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf_第4页
第4页 / 共120页
IEC TS 62351-5-2013 Power systems management and associated information exchange - Data and communications security - Part 5 Security for IEC 60870-5 and deriva.pdf_第5页
第5页 / 共120页
点击查看更多>>
资源描述

1、 IEC/TS 62351-5 Edition 2.0 2013-04 TECHNICAL SPECIFICATION Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives IEC/TS 62351-5:2013(E) THIS PUBLICATION IS COPYRIGHT PROTECTED Copyright 2013 IEC, Geneva, Switze

2、rland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or IECs member National Committee in the country

3、 of the requester. If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or your local IEC member National Committee for further information. IEC Central Office Tel.: +41 22 919 02 11 3, rue de Varemb

4、Fax: +41 22 919 03 00 CH-1211 Geneva 20 infoiec.ch Switzerland www.iec.ch About the IEC The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes International Standards for all electrical, electronic and related technologies. About IEC public

5、ations The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the latest edition, a corrigenda or an amendment might have been published. Useful links: IEC publications search - www.iec.ch/searchpub The advanced search enables you to find I

6、EC publications by a variety of criteria (reference number, text, technical committee,). It also gives information on projects, replaced and withdrawn publications. IEC Just Published - webstore.iec.ch/justpublished Stay up to date on all new IEC publications. Just Published details all new publicat

7、ions released. Available on-line and also once a month by email. Electropedia - www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing more than 30 000 terms and definitions in English and French, with equivalent terms in additional languages. Also kn

8、own as the International Electrotechnical Vocabulary (IEV) on-line. Customer Service Centre - webstore.iec.ch/csc If you wish to give us your feedback on this publication or need further assistance, please contact the Customer Service Centre: csciec.ch. IEC/TS 62351-5 Edition 2.0 2013-04 TECHNICAL S

9、PECIFICATION Power systems management and associated information exchange Data and communications security Part 5: Security for IEC 60870-5 and derivatives INTERNATIONAL ELECTROTECHNICAL COMMISSION XE ICS 33.200 PRICE CODE ISBN 978-2-83220-732-1 Registered trademark of the International Electrotechn

10、ical Commission Warning! Make sure that you obtained this publication from an authorized distributor. 2 TS 62351-5 IEC:2013(E) CONTENTS FOREWORD . 6 1 Scope and object 8 2 Normative references . 9 3 Terms and definitions . 10 4 Abbreviated terms 11 5 Problem description (informative) . 11 5.1 Overvi

11、ew of clause 11 5.2 Specific threats addressed 11 5.3 Design issues 11 5.3.1 Overview of subclause . 11 5.3.2 Asymmetric communications 11 5.3.3 Message-oriented 12 5.3.4 Poor sequence numbers or no sequence numbers . 12 5.3.5 Limited processing power 12 5.3.6 Limited bandwidth 12 5.3.7 No access to

12、 authentication server 12 5.3.8 Limited frame length 13 5.3.9 Limited checksum 13 5.3.10 Radio systems . 13 5.3.11 Dial-up systems . 13 5.3.12 Variety of protocols affected 13 5.3.13 Differing data link layers 14 5.3.14 Long upgrade intervals 14 5.3.15 Remote sites . 14 5.3.16 Multiple users 14 5.3.

13、17 Unreliable media . 14 5.4 General principles . 14 5.4.1 Overview of subclause . 14 5.4.2 Authentication only 14 5.4.3 Application layer only 15 5.4.4 Generic definition mapped onto different protocols 15 5.4.5 Bi-directional . 15 5.4.6 Challenge-response. 15 5.4.7 Pre-shared keys as default optio

14、n 15 5.4.8 Backwards tolerance . 15 5.4.9 Upgradeable 16 5.4.10 Perfect forward secrecy . 16 5.4.11 Multiple users and auditing 16 6 Theory of operation (informative) 16 6.1 Overview of clause 16 6.2 Narrative description . 16 6.2.1 Basic concepts 16 6.2.2 Initiating the challenge . 17 6.2.3 Replyin

15、g to the challenge 17 6.2.4 Authenticating . 18 6.2.5 Authentication failure . 18 TS 62351-5 IEC:2013(E) 3 6.2.6 Aggressive mode . 18 6.2.7 Changing keys . 18 6.2.8 Security statistics 22 6.3 Example message sequences . 22 6.3.1 Overview of subclause . 22 6.3.2 Challenge of a Critical ASDU . 23 6.3.

16、3 Aggressive Mode . 24 6.3.4 Initializing and changing Session Keys 24 6.4 State machine overview 28 7 Formal specification . 32 7.1 Overview of clause 32 7.2 Message definitions . 32 7.2.1 Distinction between messages and ASDUs 32 7.2.2 Challenge message . 33 7.2.3 Reply message 35 7.2.4 Aggressive

17、 Mode Request message 36 7.2.5 MAC := OS8i18i; i:=specified by MALKey Status Request message 38 7.2.6 Key Status message 38 7.2.7 Session Key Change message 41 7.2.8 Error message . 43 7.2.9 User Status Change message . 45 7.2.10 Update Key Change Request message 49 7.2.11 Update Key Change Reply me

18、ssage 51 7.2.12 Update Key Change message 52 7.2.13 Update Key Change Signature message 53 7.2.14 Update Key Change Confirmation message . 54 7.3 Formal procedures 55 7.3.1 Overview of subclause . 55 7.3.2 Security statistics 56 7.3.3 Challenger procedures 58 7.3.4 Responder procedures 74 7.3.5 Cont

19、rolling station procedures . 75 7.3.6 Controlled station procedures 88 8 Interoperability requirements 90 8.1 Overview of clause 90 8.2 Minimum requirements 90 8.2.1 Overview of subclause . 90 8.2.2 MAC algorithms . 90 8.2.3 Key wrap / transport algorithms . 91 8.2.4 Fixed values 91 8.2.5 Configurab

20、le values . 91 8.3 Options . 96 8.3.1 Overview of subclause . 96 8.3.2 MAC algorithms . 96 8.3.3 Encryption algorithms 98 8.3.4 Key wrap / transport algorithms . 98 8.3.5 Configurable values . 98 9 Special Applications . 99 4 TS 62351-5 IEC:2013(E) 9.1 Overview of clause 99 9.2 Use with TCP/IP 99 9.

21、3 Use with redundant channels. 99 9.4 Use with external link encryptors . 99 10 Requirements for referencing this specification. 99 10.1 Overview of clause 99 10.2 Selected options 99 10.3 Operations considered critical . 100 10.4 Addressing information 100 10.5 Message format mapping 100 10.6 Refer

22、ence to procedures . 100 11 Protocol implementation conformance statement 101 11.1 Overview of clause 101 11.2 Required algorithms 101 11.3 MAC algorithms . 101 11.4 Key wrap algorithms 101 11.5 Maximum Error messages sent 101 11.6 Use of Error messages 101 11.7 Update Key Change Methods 102 11.8 Us

23、er Status Change 102 Annex A (informative) Compliance with ISO/IEC 11770 103 Bibliography 109 Figure 1 Overview of interaction between Authority and stations 22 Figure 2 Example of successful Challenge of Critical ASDU . 23 Figure 3 Example of failed Challenge of Critical ASDU 23 Figure 4 Example of

24、 a successful Aggressive Mode Request . 24 Figure 5 Example of a failed Aggressive Mode Request . 24 Figure 6 Example of Session Key initialization and periodic update 25 Figure 7 Example of communications failure followed by Session Key change . 26 Figure 8 Example of successful User Status and Upd

25、ate Key Change . 27 Figure 9 User changes controlling stations . 28 Figure 10 Major state transitions for controlling station authentication 29 Figure 11 Major state transitions for controlled station authentication 30 Figure 12 Major state transitions for controlling station Update Key change . 31

26、Figure 13 Major state transitions for controlled station Update Key change 32 Figure 14 Example Use of Challenge Sequence Numbers 60 Table 1 Scope of application to standards 8 Table 2 Summary of symmetric keys used . 18 Table 3 Summary of asymmetric keys used (optional) 19 Table 4 Challenge message

27、 . 33 Table 5 Reply message . 35 Table 6 Data Included in the MAC Value calculation 36 Table 7 Aggressive Mode Request message 36 TS 62351-5 IEC:2013(E) 5 Table 8 Data Included in the MAC Value calculation in Aggressive Mode . 37 Table 9 Key Status Request Message 38 Table 10 Use of Default Session

28、Keys . 38 Table 11 Key Status Message 39 Table 12 Data Included in the MAC Value Calculation for Key Status . 41 Table 13 Key Change message 41 Table 14 Data Included in the key wrap (in order) 42 Table 15 Example of key order. 42 Table 16 Example of Wrapped Key Data 43 Table 17 Error message . 43 T

29、able 18 Creation of Certification Data 46 Table 19 User Status Change message . 46 Table 20 Update Key Change Request message 50 Table 21 Update Key Change Reply message 51 Table 22 Update Key Change message . 52 Table 23 Encrypted Update Key Data 53 Table 24 Update Key Change Signature message . 53

30、 Table 25 Data included in the Digital Signature 54 Table 26 Update Key Change Confirmation message . 54 Table 27 Data included in the MAC calculation 55 Table 28 States used in the state machine descriptions . 55 Table 29 Security statistics . 57 Table 30 Challenger state machine 63 Table 31 User r

31、oles . 77 Table 32 Controlling Station State Machine Changing Session Keys . 80 Table 33 Controlling Station State Machine Changing Update Keys 84 Table 34 Special Statistic Event Thresholds. 92 Table 35 Algorithms and Messages used for each Update Key Change Method . 94 Table 36 Size of Challenge D

32、ata 94 Table 37 Configuration of Cryptographic Information 95 Table 38 Legend for configuration of cryptographic information 96 Table 39 Construction of AES-GMAC initialization vector . 96 Table 40 Source of initialization vector components in each message 97 Table A.1 Cryptographic Notation 105 Tab

33、le A.2 Compliance with ISO/IEC 11770 107 6 TS 62351-5 IEC:2013(E) INTERNATIONAL ELECTROTECHNICAL COMMISSION _ POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE DATA AND COMMUNICATIONS SECURITY Part 5: Security for IEC 60870-5 and derivatives FOREWORD 1) The International Electrotechnical

34、Commission (IEC) is a worldwide organization for standardization comprising all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international co-operation on all questions concerning standardization in the electrical and electronic fields. To this end

35、and in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Commit

36、tee interested in the subject dealt with may participate in this preparatory work. International, governmental and non- governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for Standardization (ISO) in acc

37、ordance with conditions determined by agreement between the two organizations. 2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international consensus of opinion on the relevant subjects since each technical committee has representation from all i

38、nterested IEC National Committees. 3) IEC Publications have the form of recommendations for international use and are accepted by IEC National Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC Publications is accurate, IEC cannot be held resp

39、onsible for the way in which they are used or for any misinterpretation by any end user. 4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications transparently to the maximum extent possible in their national and regional publications. Any divergen

40、ce between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter. 5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity assessment services and, in some areas, access to IEC mark

41、s of conformity. IEC is not responsible for any services carried out by independent certification bodies. 6) All users should ensure that they have the latest edition of this publication. 7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts

42、 and members of its technical committees and IEC National Committees for any personal injury, property damage or other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and expenses arising out of the publication, use of, or reliance upon, this IEC Publ

43、ication or any other IEC Publications. 8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is indispensable for the correct application of this publication. 9) Attention is drawn to the possibility that some of the elements of this IEC Publ

44、ication may be the subject of patent rights. IEC shall not be held responsible for identifying any or all such patent rights. The main task of IEC technical committees is to prepare International Standards. In exceptional circumstances, a technical committee may propose the publication of a technica

45、l specification when the required support cannot be obtained for the publication of an International Standard, despite repeated efforts, or the subject is still under technical development or where, for any other reason, there is the future but no immediate possibility of an agreement on an Internat

46、ional Standard. Technical specifications are subject to review within three years of publication to decide whether they can be transformed into International Standards. IEC/TS 62351-5, which is a technical specification, has been prepared by IEC technical committee 57: Power systems management and a

47、ssociated information exchange. TS 62351-5 IEC:2013(E) 7 This second edition cancels and replaces the first edition published in 2009. It constitutes a technical revision. The primary changes in the second edition are: adds the capability to change Update Keys remotely; adds security statistics to a

48、id in detecting attacks; adds measures to avoid being forced to change session keys too often; discards unexpected messages more often as possible attacks; adds to the list of permitted security algorithms; adds new rules for calculating challenge sequence numbers. The text of this technical specifi

49、cation is based on the following documents: Enquiry draft Report on voting 57/1204/DTS 57/1282/RVC Full information on the voting for the approval of this technical specification can be found in the report on voting indicated in the above table. This publication has been drafted in accordance with the ISO/IEC Directives, Part 2. Capitalization has been used in the text of this specification

展开阅读全文
相关资源
  • IEC TS 62492-1-2008 Industrial process control devices - Radiation thermometers - Part 1 Technical data for radiation thermometers《工业过程控制装置 辐射温度计 第1部分 辐射温度计的技术数.pdfIEC TS 62492-1-2008 Industrial process control devices - Radiation thermometers - Part 1 Technical data for radiation thermometers《工业过程控制装置 辐射温度计 第1部分 辐射温度计的技术数.pdf
  • IEC TR2 61464-1998 Insulated bushings - Guide for the interpretation of dissolved gas analysis (DGA) in bushings where oil is the impregnating medium of the mai.pdfIEC TR2 61464-1998 Insulated bushings - Guide for the interpretation of dissolved gas analysis (DGA) in bushings where oil is the impregnating medium of the mai.pdf
  • IEC TR 61241-2-2-1993 Electrical apparatus for use in the presence of combustible dust part 2 test methods section 2 method for determining the electrical resis.pdfIEC TR 61241-2-2-1993 Electrical apparatus for use in the presence of combustible dust part 2 test methods section 2 method for determining the electrical resis.pdf
  • IEC TR 60972-1989 Classification and interpretation of new lighting products《新型照明产品的分类和说明》.pdfIEC TR 60972-1989 Classification and interpretation of new lighting products《新型照明产品的分类和说明》.pdf
  • IEC TR 60943 Edition 21-2009 Guidance concerning the permissible temperature rise for parts of electrical equipment in particular for terminals《特殊终端中电气设备部件用关于允许.pdfIEC TR 60943 Edition 21-2009 Guidance concerning the permissible temperature rise for parts of electrical equipment in particular for terminals《特殊终端中电气设备部件用关于允许.pdf
  • IEC TR 60943 AMD 1-2008 Guidance concerning the permissible temperature rise for parts of electrical equipment in particular for terminals Amendment 1《电气设备部件(特别.pdfIEC TR 60943 AMD 1-2008 Guidance concerning the permissible temperature rise for parts of electrical equipment in particular for terminals Amendment 1《电气设备部件(特别.pdf
  • IEC TR 60919-2-2008 Performance of high-voltage direct current (HVDC) systems with line-communicated converters - Part 2 Faults and switching《带线性通信转换器的高压直流(HVDC.pdfIEC TR 60919-2-2008 Performance of high-voltage direct current (HVDC) systems with line-communicated converters - Part 2 Faults and switching《带线性通信转换器的高压直流(HVDC.pdf
  • IEC TR 60870-6-505 Edition 11-2006 Telecontrol equipment and systems - Part.6-505 Telecontrol protocols compatible with ISO standards and ITU-T recommendations .pdfIEC TR 60870-6-505 Edition 11-2006 Telecontrol equipment and systems - Part.6-505 Telecontrol protocols compatible with ISO standards and ITU-T recommendations .pdf
  • IEC TR 60344 CORR1-2012 Calculation of d c resistance of plain and coated copper conductors of low-frequency cables and wires - Application guide Corrigendum 1《.pdfIEC TR 60344 CORR1-2012 Calculation of d c resistance of plain and coated copper conductors of low-frequency cables and wires - Application guide Corrigendum 1《.pdf
  • IEC 62560 CORR1-2012 Self-ballasted LED-lamps for general lighting services by voltage 50 V - Safety specifications Corrigendum 1《普通照明用50 V以上自镇流LED灯 安全要求 勘误表1》.pdfIEC 62560 CORR1-2012 Self-ballasted LED-lamps for general lighting services by voltage 50 V - Safety specifications Corrigendum 1《普通照明用50 V以上自镇流LED灯 安全要求 勘误表1》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > IEC

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1