IEC 62351-5/CD#1 IEC:2005 57/756/CDV
5
6
Theory of operation (informative).........................................................................................15
6.1 Overview .........................................................................................................................15
6.1.1 Initiating the challenge..............................................................................................15
6.1.2 Responding to the challenge ......................................................................................16
6.1.3 Authenticating ..........................................................................................................16
6.1.4 Authentication failure................................................................................................16
6.1.5 Aggressive mode.......................................................................................................16
6.1.6 Changing keys...........................................................................................................17
6.1.7 Changing asymmetric keys ........................................................................................18
6.2 Example message sequences .............................................................................................19
6.2.1 Challenge of a Critical ASDU....................................................................................19
6.2.2 Periodic Challenge ....................................................................................................20
6.2.3 Aggressive Mode ......................................................................................................21
6.3 Summary of implementations ............................................................................................22
7 Formal specification (normative) ..........................................................................................23
7.1 Message Definitions (normative) ......................................................................................23
7.1.1 Challenge message ....................................................................................................23
7.1.2 Response message .....................................................................................................25
7.1.3 Aggressive mode request ...........................................................................................26
7.1.4 Key Change message.................................................................................................28
7.1.5 Certificate Change message .......................................................................................29
7.1.6 Error message ...........................................................................................................30
7.1.7 Confirmation message ...............................................................................................31
7.2 Formal procedures...........................................................................................................32
7.2.1 Challenger procedures ...............................................................................................32
7.2.2 Responder procedures................................................................................................38
7.2.3 Controlling Station Procedures ..................................................................................39
7.2.4 Controlled station procedures ....................................................................................42
8 Interoperability requirements...............................................................................................44
8.1 Minimum requirements (normative) ..................................................................................44
8.1.1 Hashing Algorithms ..................................................................................................44
8.1.2 Encryption Algorithms ..............................................................................................44
8.1.3 Fixed values..............................................................................................................45
8.1.4 Configurable values...................................................................................................45
8.2 Options (normative) .........................................................................................................46
8.2.1 Hash algorithms ........................................................................................................46
8.2.2 Encryption algorithms ...............................................................................................46
8.2.3 Configurable values...................................................................................................46
9 Implementation in IEC 60870-5-101 .....................................................................................47
9.1 Selected options and functions..........................................................................................47
9.2 Operations considered critical..........................................................................................47
9.3 Changes to data definitions ..............................................................................................47
9.4 Changes to ASDU definitions............................................................................................47
9.5 Changes to interoperability tables ....................................................................................47
9.6 Changes to test procedures...............................................................................................47