Shopping Cart

No products in the cart.

BSI PD IEC/TS 62351-5:2013:2014 Edition

$215.11

Power systems management and associated information exchange. Data and communications security – Security for IEC 60870-5 and derivatives

Published By Publication Date Number of Pages
BSI 2014 120
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of IEC 62351 specifies messages, procedures and algorithms for securing the operation of all protocols based on or derived from IEC 60870-5: Telecontrol equipment and systems – Transmission protocols. This Technical Specification applies to at least those protocols listed in Table 1.

Table 1 – Scope of application to standards

The initial audience for this Technical Specification is intended to be the members of the working groups developing the protocols listed in Table 1. For the measures described in this specification to take effect, they must be accepted and referenced by the specifications for the protocols themselves. This document is written to enable that process.

The subsequent audience for this specification is intended to be the developers of products that implement these protocols.

Portions of this specification may also be of use to managers and executives in order to understand the purpose and requirements of the work.

This part of IEC/TS 62351 focuses only on application layer authentication and security issues arising from such authentication. Other security concerns – in particular, protection from eavesdropping or man-in-the-middle attacks through the use of encryption – are considered to be outside the scope. Encryption may be added through the use of this specification with other specifications.

This document is organized working from the general to the specific, as follows:

  • Clauses 2 through 4 provide background terms, definitions, and references.

  • Clause 5 describes the problems this specification is intended to address.

  • Clause 6 describes the mechanism generically without reference to a specific protocol.

  • Clauses 7 and 8 describe the mechanism more precisely and are the primary normative part of this specification.

  • Clause 9 describes a few particular implementation issues that are special cases.

  • Clause 10 describes the requirements for other standards referencing this specification.

  • Clause 11 describes the Protocol Implementation Conformance Statement (PICS) for this mechanism.

Unless specifically labelled as informative or optional, all clauses of this specification are normative.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
8 FOREWORD
10 1 Scope and object
Tables
Table 1 – Scope of application to standards
11 2 Normative references
12 3 Terms and definitions
13 4 Abbreviated terms
5 Problem description (informative)
5.1 Overview of clause
5.2 Specific threats addressed
5.3 Design issues
5.3.1 Overview of subclause
5.3.2 Asymmetric communications
14 5.3.3 Message-oriented
5.3.4 Poor sequence numbers or no sequence numbers
5.3.5 Limited processing power
5.3.6 Limited bandwidth
5.3.7 No access to authentication server
15 5.3.8 Limited frame length
5.3.9 Limited checksum
5.3.10 Radio systems
5.3.11 Dial-up systems
5.3.12 Variety of protocols affected
16 5.3.13 Differing data link layers
5.3.14 Long upgrade intervals
5.3.15 Remote sites
5.3.16 Multiple users
5.3.17 Unreliable media
5.4 General principles
5.4.1 Overview of subclause
5.4.2 Authentication only
17 5.4.3 Application layer only
5.4.4 Generic definition mapped onto different protocols
5.4.5 Bi-directional
5.4.6 Challenge-response
5.4.7 Pre-shared keys as default option
5.4.8 Backwards tolerance
18 5.4.9 Upgradeable
5.4.10 Perfect forward secrecy
5.4.11 Multiple users and auditing
6 Theory of operation (informative)
6.1 Overview of clause
6.2 Narrative description
6.2.1 Basic concepts
19 6.2.2 Initiating the challenge
6.2.3 Replying to the challenge
20 6.2.4 Authenticating
6.2.5 Authentication failure
6.2.6 Aggressive mode
6.2.7 Changing keys
Table 2 – Summary of symmetric keys used
21 Table 3 – Summary of asymmetric keys used (optional)
24 6.2.8 Security statistics
6.3 Example message sequences
6.3.1 Overview of subclause
Figures
Figure 1 – Overview of interaction between Authority and stations
25 6.3.2 Challenge of a Critical ASDU
Figure 2 – Example of successful Challenge of Critical ASDU
Figure 3 – Example of failed Challenge of Critical ASDU
26 6.3.3 Aggressive Mode
6.3.4 Initializing and changing Session Keys
Figure 4 – Example of a successful Aggressive Mode Request
Figure 5 – Example of a failed Aggressive Mode Request
27 Figure 6 – Example of Session Key initialization and periodic update
28 Figure 7 – Example of communications failure followed by Session Key change
29 Figure 8 – Example of successful User Status and Update Key Change
30 6.4 State machine overview
Figure 9 – User changes controlling stations
31 Figure 10 – Major state transitions for controlling station authentication
32 Figure 11 – Major state transitions for controlled station authentication
33 Figure 12 – Major state transitions for controlling station Update Key change
34 7 Formal specification
7.1 Overview of clause
7.2 Message definitions
7.2.1 Distinction between messages and ASDUs
Figure 13 – Major state transitions for controlled station Update Key change
35 7.2.2 Challenge message
Table 4 – Challenge message
37 7.2.3 Reply message
Table 5 – Reply message
38 7.2.4 Aggressive Mode Request message
Table 6 – Data Included in the MAC Value calculation
Table 7 – Aggressive Mode Request message
39 Table 8 – Data Included in the MAC Value calculation in Aggressive Mode
40 7.2.5 MAC := OS8i[1..8i]; i:=specified by MALKey Status Request message
7.2.6 Key Status message
Table 9 – Key Status Request Message
Table 10 – Use of Default Session Keys
41 Table 11 – Key Status Message
43 7.2.7 Session Key Change message
Table 12 – Data Included in the MAC Value Calculation for Key Status
Table 13 – Key Change message
44 Table 14 – Data Included in the key wrap (in order)
Table 15 – Example of key order
45 7.2.8 Error message
Table 16 – Example of Wrapped Key Data
Table€17 – Error message
47 7.2.9 User Status Change message
48 Table 18 – Creation of Certification Data
Table 19 – User Status Change message
51 7.2.10 Update Key Change Request message
52 Table 20 – Update Key Change Request message
53 7.2.11 Update Key Change Reply message
Table 21 – Update Key Change Reply message
54 7.2.12 Update Key Change message
Table 22 – Update Key Change message
55 7.2.13 Update Key Change Signature message
Table 23 – Encrypted Update Key Data
Table 24 – Update Key Change Signature message
56 7.2.14 Update Key Change Confirmation message
Table 25 – Data included in the Digital Signature
Table 26 – Update Key Change Confirmation message
57 7.3 Formal procedures
7.3.1 Overview of subclause
Table 27 – Data included in the MAC calculation
Table 28 – States used in the state machine descriptions
58 7.3.2 Security statistics
59 Table 29 –Security statistics
60 7.3.3 Challenger procedures
62 Figure 14 – Example Use of Challenge Sequence Numbers (1 of 2)
65 Table 30 – Challenger state machine
82 7.3.4 Responder procedures
83 7.3.5 Controlling station procedures
85 Table 31 – User roles
88 Table 32 – Controlling Station State Machine – Changing Session Keys
92 Table 33 – Controlling Station State Machine – Changing Update Keys
96 7.3.6 Controlled station procedures
98 8 Interoperability requirements
8.1 Overview of clause
8.2 Minimum requirements
8.2.1 Overview of subclause
8.2.2 MAC algorithms
99 8.2.3 Key wrap / transport algorithms
8.2.4 Fixed values
8.2.5 Configurable values
100 Table 34 – Special Statistic Event Thresholds
102 Table 35 – Algorithms and Messages used for each Update Key Change Method
Table 36 – Size of Challenge Data
103 Table 37 – Configuration of Cryptographic Information
104 8.3 Options
8.3.1 Overview of subclause
8.3.2 MAC algorithms
Table 38 – Legend for configuration of cryptographic information
Table 39 – Construction of AES-GMAC initialization vector
105 Table 40 – Source of initialization vector components in each message
106 8.3.3 Encryption algorithms
8.3.4 Key wrap / transport algorithms
8.3.5 Configurable values
107 9 Special Applications
9.1 Overview of clause
9.2 Use with TCP/IP
9.3 Use with redundant channels
9.4 Use with external link encryptors
10 Requirements for referencing this specification
10.1 Overview of clause
10.2 Selected options
108 10.3 Operations considered critical
10.4 Addressing information
10.5 Message format mapping
10.6 Reference to procedures
109 11 Protocol implementation conformance statement
11.1 Overview of clause
11.2 Required algorithms
11.3 MAC algorithms
11.4 Key wrap algorithms
11.5 Maximum Error messages sent
11.6 Use of Error messages
110 11.7 Update Key Change Methods
11.8 User Status Change
111 Annex A (informative) Compliance with ISO/IEC 11770
113 Table A.1 – Cryptographic Notation
115 Table A.2 – Compliance with ISO/IEC 11770
117 Bibliography
BSI PD IEC/TS 62351-5:2013
$215.11