EasyManua.ls Logo

ABB RELION REX615 - Secure Authentication Conformance Statement; Overview of Clause; Required Algorithms; MAC Algorithms

ABB RELION REX615
59 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5 Secure authentication conformance
statement
5.1 Overview of clause
Implementers of this specification shall supply the information in this section on
request. An “X” in a box means that the implementation supports the listed feature.
5.2 Required algorithms
If the implementer does not declare support for an algorithm marked “(required)”,
interoperability cannot be guaranteed.
If an algorithm is not supported due to export restrictions, the implementer
shall provide a copy of the export restriction that prohibits its export. This
algorithm shall not be supported if and only if export restrictions do not allow any
mechanism of exportation. If this algorithm is not supported, the implementation
shall be clearly documented as adhering to the export restrictions, as supplied.
The documentation shall also specify that the interoperable/base specification
requirements are not supported. Samples of the documentation shall be provided.
5.3 MAC algorithms
HMAC-SHA256
Other _____________
Mandatory algorithm could not
be provided.
Reason: _____________
5.4 Key wrap algorithms
AES-256 Key Wrap (required)
Other _____________
Mandatory algorithm could not
be provided.
Reason: _____________
2NGA001859 A Secure authentication conformance
statement
REX615
IEC 60870-5-104 Communication Protocol Manual
47

Table of Contents

Related product manuals