IEC 62351-9-2017 Power systems management and associated information exchange - Data and communications security - Part 9 Cyber security key management for powe.pdf
《IEC 62351-9-2017 Power systems management and associated information exchange - Data and communications security - Part 9 Cyber security key management for powe.pdf》由会员分享,可在线阅读,更多相关《IEC 62351-9-2017 Power systems management and associated information exchange - Data and communications security - Part 9 Cyber security key management for powe.pdf(90页珍藏版)》请在麦多课文档分享上搜索。
1、 IEC 62351-9 Edition 1.0 2017-05 INTERNATIONAL STANDARD Power systems management and associated information exchange Data and communications security Part 9: Cyber security key management for power system equipment IEC 62351-9:2017-05(en) colour inside THIS PUBLICATION IS COPYRIGHT PROTECTED Copyrig
2、ht 2017 IEC, Geneva, Switzerland All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either IEC or IECs member Nation
3、al Committee in the country of the requester. If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or your local IEC member National Committee for further information. IEC Central Office Tel.: +41 22
4、919 02 11 3, rue de Varemb Fax: +41 22 919 03 00 CH-1211 Geneva 20 infoiec.ch Switzerland www.iec.ch About the IEC The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes International Standards for all electrical, electronic and related tec
5、hnologies. About IEC publications The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the latest edition, a corrigenda or an amendment might have been published. IEC Catalogue - webstore.iec.ch/catalogue The stand-alone application for c
6、onsulting the entire bibliographical information on IEC International Standards, Technical Specifications, Technical Reports and other documents. Available for PC, Mac OS, Android Tablets and iPad. IEC publications search - www.iec.ch/searchpub The advanced search enables to find IEC publications by
7、 a variety of criteria (reference number, text, technical committee,). It also gives information on projects, replaced and withdrawn publications. IEC Just Published - webstore.iec.ch/justpublished Stay up to date on all new IEC publications. Just Published details all new publications released. Ava
8、ilable online and also once a month by email. Electropedia - www.electropedia.org The worlds leading online dictionary of electronic and electrical terms containing 20 000 terms and definitions in English and French, with equivalent terms in 16 additional languages. Also known as the International E
9、lectrotechnical Vocabulary (IEV) online. IEC Glossary - std.iec.ch/glossary 65 000 electrotechnical terminology entries in English and French extracted from the Terms and Definitions clause of IEC publications issued since 2002. Some entries have been collected from earlier publications of IEC TC 37
10、, 77, 86 and CISPR. IEC Customer Service Centre - webstore.iec.ch/csc If you wish to give us your feedback on this publication or need further assistance, please contact the Customer Service Centre: csciec.ch. IEC 62351-9 Edition 1.0 2017-05 INTERNATIONAL STANDARD Power systems management and associ
11、ated information exchange Data and communications security Part 9: Cyber security key management for power system equipment INTERNATIONAL ELECTROTECHNICAL COMMISSION ICS 33.200 ISBN 978-2-8322-4220-9 Registered trademark of the International Electrotechnical Commission Warning! Make sure that you ob
12、tained this publication from an authorized distributor. colour inside 2 IEC 62351-9:2017 IEC 2017 CONTENTS FOREWORD . 6 1 Scope 8 2 Normative references 8 3 Terms and definitions 9 4 Abbreviations and acronyms 14 5 Cryptographic applications for power system implementations . 15 5.1 Cryptography, cr
13、yptographic keys, and security objectives 15 5.2 Types of cryptography 16 5.3 Uses of cryptography 16 5.3.1 Goals of cyber security 16 5.3.2 Confidentiality 17 5.3.3 Data integrity . 17 5.3.4 Authentication 18 5.3.5 Non-repudiation . 18 5.3.6 Trust 18 6 Key management concepts and methods in power s
14、ystem operations . 19 6.1 Key management system security policy . 19 6.2 Key management design principles for power system operations 19 6.3 Use of Transport Layer Security (TLS) 19 6.4 Cryptographic key usages . 19 6.5 Trust using a public-key infrastructure (PKI) 20 6.5.1 Registration authorities
15、(RA) 20 6.5.2 Certification authority (CA) 20 6.5.3 Public-key certificates 20 6.5.4 Attribute certificates . 21 6.5.5 Public-key certificate and attribute certificate extensions . 21 6.6 Trust via non-PKI self-signed certificates 22 6.7 Authorization and validation lists . 22 6.7.1 General . 22 6.7
16、.2 AVLs in non-constrained environments 23 6.7.3 AVLs in constrained environments . 23 6.7.4 Use of self-signed public-key certificates in AVLs 23 6.8 Trust via pre-shared keys 23 6.9 Session keys 24 6.10 Protocols used in trust establishment 24 6.10.1 Certification request 24 6.10.2 Trust Anchor Ma
17、nagement Protocol (TAMP) 24 6.10.3 Simple Certificate Enrolment Protocol (SCEP) . 24 6.10.4 Internet X.509 PKI Certificate Management Protocol (CMP) . 24 6.10.5 Certificate Management over CMS (CMC) . 25 6.10.6 Enrolment over Secure Transport (EST) 25 6.10.7 Summary view on the different protocols .
18、 25 6.11 Group keys . 26 6.11.1 Purpose of group keys . 26 6.11.2 Group Domain of Interpretation (GDOI) . 26 6.12 Key management lifecycle 31 IEC 62351-9:2017 IEC 2017 3 6.12.1 Key management in the life cycle of an entity 31 6.12.2 Cryptographic key lifecycle 32 6.13 Certificate management processe
19、s . 34 6.13.1 Certificate management process 34 6.13.2 Initial certificate creation 34 6.13.3 Enrolment of an entity 34 6.13.4 Certificate signing request (CSR) process . 36 6.13.5 Certificate revocation lists (CRLs) 37 6.13.6 Online certificate status protocol (OCSP) . 38 6.13.7 Server-based certif
20、icate validation protocol (SCVP) . 41 6.13.8 Short-lived certificates . 41 6.13.9 Certificate renewal . 42 6.14 Alternative process for asymmetric keys generated outside the entity . 43 6.15 Key distribution for symmetric keys with different time frames . 44 7 General key management requirements . 4
21、4 7.1 Asymmetric and symmetric key management requirements . 44 7.2 Required cryptographic materials 44 7.3 Public-Key certificates requirements . 45 7.4 Cryptographic key protection. 45 7.5 Use of existing security key management infrastructure 45 7.6 Use of object identifiers 45 8 Asymmetric key m
22、anagement 45 8.1 Certificate generation and installation . 45 8.1.1 Private and public key generation and installation 45 8.1.2 Private and public key renewal 46 8.1.3 Random Number Generation . 46 8.1.4 Certificate policy 46 8.1.5 Entity registration for identity establishment . 46 8.1.6 Entity con
23、figuration 47 8.1.7 Entity enrolment 47 8.1.8 Trust anchor information update 48 8.2 Public-key certificate revocation 49 8.3 Certificate validity . 49 8.3.1 Validity of certificates 49 8.3.2 Certificate revocation . 50 8.3.3 Certificate revocation status checking 50 8.3.4 Handling of authorization
24、and validation lists (AVLs) 50 8.4 Certificate expiration and renewal . 55 8.5 Secured Time Synchronization 55 9 Symmetric key management 56 9.1 Group based key management (GDOI) . 56 9.1.1 GDOI requirements 56 9.1.2 Internet Key Exchange Version 1 (IKEv1) 56 9.1.3 Phase 1 IKEv1 main mode exchange t
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- IEC6235192017POWERSYSTEMSMANAGEMENTANDASSOCIATEDINFORMATIONEXCHANGEDATAANDCOMMUNICATIONSSECURITYPART9CYBERSECURITYKEYMANAGEMENTFORPOWEPDF

链接地址:http://www.mydoc123.com/p-1241965.html