Version 1: Release Note 28 November 2014



Download 4.8 Mb.
Page27/258
Date03.04.2021
Size4.8 Mb.
1   ...   23   24   25   26   27   28   29   30   ...   258

DLMS Client and Server


The Access Control Broker shall perform the role of DLMS COSEM client in relation to the DLMS COSEM Application Associations, and the Device shall perform the role of DLMS COSEM server.
      1. Cryptographic Primitives and their Usage


In relation to any Remote Party Message, Smart Metering Entities shall:

  • use SHA-256, as specified in FIPS 180-410, as the Hash function;

  • use the AES-128 cipher, as specified in FIPS 19711, as the block cipher primitive;

  • use the Galois Counter Mode (GCM) mode of operation as specified in NIST Special Publication 800-38D12 ;

  • use the GMAC technique, based on the use of AES-128, for the calculation of Message Authentication Codes (MACs), as specified in NIST Special Publication 800-38D (see above);

  • use, as the Digital Signature technique, ECDSA (as specified in FIPS PUB 186-413) in combination with the curve P-256 (as specified in FIPS PUB 186-4 at Section D.1.2.3) and SHA-256 as the Hash function. Within Messages, Signatures shall be in the Plain Format;

  • use, to calculate the Shared Secret Z, the Static Unified Model, C(0e, 2s, ECC CDH) Key Agreement technique (as specified in NIST Special Publication 800-56Ar214 save for the requirement to zeroize the Shared Secret) with:

        • the Single-step Key Derivation Function (KDF) based on SHA-256, as specified in NIST Special Publication 800-56Ar2; and

        • the P-256 curve for the elliptic curve operations.

Resulting DerivedKeyingMaterial (with its meaning in NIST Special Publication 800-56Ar2) shall only ever be used in relation to one Message instance. Any Shared Secret that is not ‘zeroized’ shall be stored and used with the same security protections as Private Keys.

        1. Directory: government -> uploads -> system -> uploads -> attachment data -> file
          file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
          file -> 8 Section 1 : Sport
          file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
          file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
          file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
          file -> Crown copyright 2012
          file -> This is the Report to Government by the Film Policy Review Panel The brief
          file -> Impact Assessment (IA)
          file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)


          Share with your friends:
1   ...   23   24   25   26   27   28   29   30   ...   258




The database is protected by copyright ©essaydocs.org 2020
send message

    Main page