5 Secure authentication conformance
statement
5.1 Overview of clause
Implementers of this specification shall supply the information in this section on
request. An “X” in a box means that the implementation supports the listed feature.
5.2 Required algorithms
If the implementer does not declare support for an algorithm marked “(required)”,
interoperability cannot be guaranteed.
If an algorithm is not supported due to export restrictions, the implementer
shall provide a copy of the export restriction that prohibits its export. This
algorithm shall not be supported if and only if export restrictions do not allow any
mechanism of exportation. If this algorithm is not supported, the implementation
shall be clearly documented as adhering to the export restrictions, as supplied.
The documentation shall also specify that the interoperable/base specification
requirements are not supported. Samples of the documentation shall be provided.
5.3 MAC algorithms
HMAC-SHA256
Other _____________
Mandatory algorithm could not
be provided.
Reason: _____________
5.4 Key wrap algorithms
AES-256 Key Wrap (required)
Other _____________
Mandatory algorithm could not
be provided.
Reason: _____________
2NGA001859 A Secure authentication conformance
statement
REX615
IEC 60870-5-104 Communication Protocol Manual
47