{"id":255495,"date":"2024-10-19T16:53:24","date_gmt":"2024-10-19T16:53:24","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62351-92017\/"},"modified":"2024-10-25T12:21:16","modified_gmt":"2024-10-25T12:21:16","slug":"bs-en-62351-92017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62351-92017\/","title":{"rendered":"BS EN 62351-9:2017"},"content":{"rendered":"
This part of IEC 62351<\/span> <\/span> specifies cryptographic key management, namely how to generate, distribute, revoke, and handle public-key certificates and cryptographic keys to protect digital data and its communication. Included in the scope is the handling of asymmetric keys (e.g. private keys and public-key certificates), as well as symmetric keys for groups (GDOI).<\/p>\n This part of IEC 62351<\/span> <\/span> assumes that other standards have already chosen the type of keys and cryptography that will be utilized, since the cryptography algorithms and key materials chosen will be typically mandated by an organization\u2019s own local security policies and by the need to be compliant with other international standards. This document therefore specifies only the management techniques for these selected key and cryptography infrastructures. The objective is to define requirements and technologies to achieve interoperability of key management.<\/p>\n The purpose of this part of IEC 62351<\/span> <\/span> is to guarantee interoperability among different vendors by specifying or limiting key management options to be used. This document assumes that the reader understands cryptography and PKI principles.<\/p>\n Power systems management and associated information exchange. Data and communications security – Cyber security key management for power system equipment<\/b><\/p>\nPDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n National foreword <\/td>\n<\/tr>\n \n 7<\/td>\n CONTENTS <\/td>\n<\/tr>\n \n 11<\/td>\n FOREWORD <\/td>\n<\/tr>\n \n 13<\/td>\n 1 Scope
2 Normative references <\/td>\n<\/tr>\n\n 14<\/td>\n 3 Terms and definitions <\/td>\n<\/tr>\n \n 19<\/td>\n 4 Abbreviations and acronyms <\/td>\n<\/tr>\n \n 20<\/td>\n 5 Cryptographic applications for power system implementations
5.1 Cryptography, cryptographic keys, and security objectives <\/td>\n<\/tr>\n\n 21<\/td>\n 5.2 Types of cryptography
5.3 Uses of cryptography
5.3.1 Goals of cyber security <\/td>\n<\/tr>\n\n 22<\/td>\n 5.3.2 Confidentiality
5.3.3 Data integrity <\/td>\n<\/tr>\n\n 23<\/td>\n 5.3.4 Authentication
5.3.5 Non-repudiation
5.3.6 Trust <\/td>\n<\/tr>\n\n 24<\/td>\n 6 Key management concepts and methods in power system operations
6.1 Key management system security policy
6.2 Key management design principles for power system operations
6.3 Use of Transport Layer Security (TLS)
6.4 Cryptographic key usages <\/td>\n<\/tr>\n\n 25<\/td>\n 6.5 Trust using a public-key infrastructure (PKI)
6.5.1 Registration authorities (RA)
6.5.2 Certification authority (CA)
6.5.3 Public-key certificates <\/td>\n<\/tr>\n\n 26<\/td>\n 6.5.4 Attribute certificates
6.5.5 Public-key certificate and attribute certificate extensions
Figures
Figure 1 \u2013 Relationship between public-key certificates and attribute certificates <\/td>\n<\/tr>\n\n 27<\/td>\n 6.6 Trust via non-PKI self-signed certificates
6.7 Authorization and validation lists
6.7.1 General <\/td>\n<\/tr>\n\n 28<\/td>\n 6.7.2 AVLs in non-constrained environments
6.7.3 AVLs in constrained environments
6.7.4 Use of self-signed public-key certificates in AVLs
6.8 Trust via pre-shared keys <\/td>\n<\/tr>\n\n 29<\/td>\n 6.9 Session keys
6.10 Protocols used in trust establishment
6.10.1 Certification request
6.10.2 Trust Anchor Management Protocol (TAMP)
6.10.3 Simple Certificate Enrolment Protocol (SCEP)
6.10.4 Internet X.509 PKI Certificate Management Protocol (CMP) <\/td>\n<\/tr>\n\n 30<\/td>\n 6.10.5 Certificate Management over CMS (CMC)
6.10.6 Enrolment over Secure Transport (EST)
6.10.7 Summary view on the different protocols <\/td>\n<\/tr>\n\n 31<\/td>\n 6.11 Group keys
6.11.1 Purpose of group keys
6.11.2 Group Domain of Interpretation (GDOI)
Figure 2 \u2013 Group key management distribution <\/td>\n<\/tr>\n\n 32<\/td>\n Figure 3 \u2013 GDOI IKE Phase 1 \u2013 Authentication and securing communication channel <\/td>\n<\/tr>\n \n 33<\/td>\n Figure 4 \u2013 GDOI Pull Phase 2 <\/td>\n<\/tr>\n \n 35<\/td>\n Figure 5 \u2013 Key renewal triggered by the entities <\/td>\n<\/tr>\n \n 36<\/td>\n 6.12 Key management lifecycle
6.12.1 Key management in the life cycle of an entity
Figure 6 \u2013 Key management in product life cycle <\/td>\n<\/tr>\n\n 37<\/td>\n 6.12.2 Cryptographic key lifecycle
Figure 7 \u2013 Simplified certificate life cycle <\/td>\n<\/tr>\n\n 38<\/td>\n Figure 8 \u2013 Cryptographic key life cycle <\/td>\n<\/tr>\n \n 39<\/td>\n 6.13 Certificate management processes
6.13.1 Certificate management process
6.13.2 Initial certificate creation
6.13.3 Enrolment of an entity <\/td>\n<\/tr>\n\n 40<\/td>\n Figure 9 \u2013 Example of the SCEP entity enrolment and CSR process <\/td>\n<\/tr>\n \n 41<\/td>\n 6.13.4 Certificate signing request (CSR) process
Figure 10 \u2013 Example of the EST entity enrolment and CSR process <\/td>\n<\/tr>\n\n 42<\/td>\n 6.13.5 Certificate revocation lists (CRLs)
Figure 11 \u2013 CSR processing <\/td>\n<\/tr>\n\n 43<\/td>\n 6.13.6 Online certificate status protocol (OCSP)
Figure 12 \u2013 Certificate revocation list <\/td>\n<\/tr>\n\n 44<\/td>\n Figure 13 \u2013 Overview of the online certificate status protocol (OCSP) <\/td>\n<\/tr>\n \n 45<\/td>\n Figure 14 \u2013 Diagram using a combination of CRL and OCSP processes <\/td>\n<\/tr>\n \n 46<\/td>\n 6.13.7 Server-based certificate validation protocol (SCVP)
6.13.8 Short-lived certificates
Figure 15 \u2013 Call Flows for the Online Certificate Status Protocol (OCSP)
Figure 16 \u2013 Overview Server-Based Certificate Validation Protocol using OCSP Backend <\/td>\n<\/tr>\n\n 47<\/td>\n 6.13.9 Certificate renewal
Figure 17 \u2013 SCEP certificate renewal <\/td>\n<\/tr>\n\n 48<\/td>\n 6.14 Alternative process for asymmetric keys generated outside the entity
Figure 18 \u2013 EST certificate renewal\/rekeying <\/td>\n<\/tr>\n\n 49<\/td>\n 6.15 Key distribution for symmetric keys with different time frames
7 General key management requirements
7.1 Asymmetric and symmetric key management requirements
7.2 Required cryptographic materials
Figure 19 \u2013 Central certificate generation <\/td>\n<\/tr>\n\n 50<\/td>\n 7.3 Public-Key certificates requirements
7.4 Cryptographic key protection
7.5 Use of existing security key management infrastructure
7.6 Use of object identifiers
8 Asymmetric key management
8.1 Certificate generation and installation
8.1.1 Private and public key generation and installation <\/td>\n<\/tr>\n\n 51<\/td>\n 8.1.2 Private and public key renewal
8.1.3 Random Number Generation
8.1.4 Certificate policy
8.1.5 Entity registration for identity establishment <\/td>\n<\/tr>\n\n 52<\/td>\n 8.1.6 Entity configuration
8.1.7 Entity enrolment <\/td>\n<\/tr>\n\n 53<\/td>\n 8.1.8 Trust anchor information update <\/td>\n<\/tr>\n \n 54<\/td>\n 8.2 Public-key certificate revocation
8.3 Certificate validity
8.3.1 Validity of certificates <\/td>\n<\/tr>\n\n 55<\/td>\n 8.3.2 Certificate revocation
8.3.3 Certificate revocation status checking
8.3.4 Handling of authorization and validation lists (AVLs) <\/td>\n<\/tr>\n\n 60<\/td>\n 8.4 Certificate expiration and renewal
8.5 Secured Time Synchronization <\/td>\n<\/tr>\n\n 61<\/td>\n 9 Symmetric key management
9.1 Group based key management (GDOI)
9.1.1 GDOI requirements
9.1.2 Internet Key Exchange Version 1 (IKEv1)
Tables
Table 1 \u2013 KDC IKEv1 Requirements <\/td>\n<\/tr>\n\n 62<\/td>\n 9.1.3 Phase 1 IKEv1 main mode exchange type 2
Figure 20 \u2013 IKEv1 (RFC 2409) main mode exchange with RSA digital signatures <\/td>\n<\/tr>\n\n 63<\/td>\n Figure 21 \u2013 IKEv1 main mode exchange and security association messages <\/td>\n<\/tr>\n \n 64<\/td>\n Figure 22 \u2013 IKEv1 main mode exchange: key exchange messages
Figure 23 \u2013 IKEv1 Main Mode Exchange: ID authentication messages <\/td>\n<\/tr>\n\n 65<\/td>\n 9.1.4 Phase 1\/2 ISAKMP informational exchange type 5
Figure 24 \u2013 IKEv1 HASH_I calculation <\/td>\n<\/tr>\n\n 66<\/td>\n Figure 25 \u2013 Phase 1 Informational Exchange <\/td>\n<\/tr>\n \n 67<\/td>\n 9.1.5 Phase 2 GDOI GROUPKEY-PULL exchange type 32
Figure 26 \u2013 GD004FI GROUPKEY-PULL as define in RFC 6407 <\/td>\n<\/tr>\n\n 68<\/td>\n Figure 27 \u2013 GROUPKEY-PULL hash computations <\/td>\n<\/tr>\n \n 69<\/td>\n Figure 28 \u2013 GROUPKEY-PULL initial SA request exchange
Figure 29 \u2013 RFC 6407 Identification Payload <\/td>\n<\/tr>\n\n 70<\/td>\n Figure 30 \u2013 ID_OID Identification Data
Table 2 \u2013 IEC\u00a061850 Object IDs: Mandatory (m) and Optional (o) <\/td>\n<\/tr>\n\n 71<\/td>\n Figure\u00a031 \u2013 61850_UDP_ADDR_GOOSE\/SV ASN.1 BNF
Figure 32 \u2013 IPADDRESS ASN.1 BNF <\/td>\n<\/tr>\n\n 72<\/td>\n Figure 33 \u2013 Example IecUdpAddrPayload ASN.1 Data with DER Encoding
Figure 34 \u2013 61850_UDP_TUNNEL Payload ASN.1 BNF
Figure 35 \u2013 61850_ETHERNET_GOOSE\/SV Payload ASN.1 BNF <\/td>\n<\/tr>\n\n 73<\/td>\n Figure 36 \u2013 RFC 6407 SA TEK Payload <\/td>\n<\/tr>\n \n 74<\/td>\n Figure 37 \u2013 IEC-61850 SA TEK Payload <\/td>\n<\/tr>\n \n 75<\/td>\n 9.1.6 GROUPKEY-PULL group key download exchange
Figure 38 \u2013 GROUPKEY-PULL Key Download Exchange <\/td>\n<\/tr>\n\n 76<\/td>\n 10 Connections to the IEC\u00a062351 parts and other IEC documents
Figure 39 \u2013 IEC\u00a062351 Part 9 relationship to other IEC\u00a062351 parts <\/td>\n<\/tr>\n\n 78<\/td>\n Annex\u00a0A (normative)Protocol Implementation Conformance Statement (PICS) <\/td>\n<\/tr>\n \n 79<\/td>\n Annex\u00a0B (informative)Random Number Generation (RNG)
B.1 Random number generation types
B.2 Deterministic random bit generators <\/td>\n<\/tr>\n\n 80<\/td>\n B.3 Non-deterministic random number generation
B.4 Entropy sources <\/td>\n<\/tr>\n\n 81<\/td>\n Annex\u00a0C (informative)Certificate enrolment and renewal flowcharts
C.1 Certificate enrolment
C.2 Certificate renewal
Figure C.1 \u2013 Certificate enrolment <\/td>\n<\/tr>\n\n 82<\/td>\n Figure C.2 \u2013 Certificate renewal state machine <\/td>\n<\/tr>\n \n 83<\/td>\n Annex\u00a0D (informative)Examples of certificate profiles <\/td>\n<\/tr>\n \n 84<\/td>\n Table D.1 \u2013 Examples of operator public-key certificates <\/td>\n<\/tr>\n \n 85<\/td>\n Table D.2 \u2013 Examples of OEM certificates <\/td>\n<\/tr>\n \n 86<\/td>\n Table D.3 \u2013 Example of OCSP certificate <\/td>\n<\/tr>\n \n 87<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2017<\/td>\n 94<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":255500,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-255495","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/255495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/255500"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=255495"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=255495"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=255495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}