PRICES include / exclude VAT
Homepage>IEC Standards>IEC 62351-9:2017 - Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
Sponsored link
download between 0-24 hoursReleased: 2017-05-18
IEC 62351-9:2017 - Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment

IEC 62351-9:2017

Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment

Gestion des systèmes de puissance et échanges d'informations associés – Sécurité des communications et des données – Partie 9: Gestion de clé de cybersécurité des équipements de système de puissance

CURRENCY
LANGUAGE
Standard number:IEC 62351-9:2017
Released:2017-05-18
Language:English
DESCRIPTION

IEC 62351-9:2017

IEC 62351-9:2017 specifies cryptographic key management, namely how to generate, distribute, revoke, and handle public-key certificates and cryptographic keys to protect digital data and its communication. Included in the scope is the handling of asymmetric keys (e.g. private keys and public-key certificates), as well as symmetric keys for groups (GDOI). This document assumes that other standards have already chosen the type of keys and cryptography that will be utilized, since the cryptography algorithms and key materials chosen will be typically mandated by an organization’s own local security policies and by the need to be compliant with other international standards. This document therefore specifies only the management techniques for these selected key and cryptography infrastructures. The objective is to define requirements and technologies to achieve interoperability of key management. The purpose of this document is to guarantee interoperability among different vendors by specifying or limiting key management options to be used. This document assumes that the reader understands cryptography and PKI principles.

This product includes: