User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
Date Code 20050615 Instruction Manual SEL-3022 Transceiver
Wireless Operator Interface Security
The SEL Security Application
C.11
Cryptographic Manual—Do Not Copy
might use K1 for encryption and K2 for decryption. The AES encryption algorithm the
SEL-3022 uses is a symmetric block cipher, with an encryption/decryption key size of
128 bits.
The Advanced Encryption Standard (AES) is the latest encryption standard adopted by
the National Institute of Standards and Technology (NIST). In 1997, NIST challenged
the cryptographic community to develop the next generation encryption algorithm to
replace the aging DES and 3DES encryption standards. In 2000, NIST chose the
Rijndael encryption algorithm as the AES encryption standard. During the evaluation
of candidates for the AES standard, some of the best cryptanalysts in the world
analyzed and approved Rijndael. Since NIST adopted the standard in 2001, AES has
proven to be very effective against known attacks.
Combined HMAC SHA-1
and AES Encryption Security
Every frame transmitted over the SEL-3022 wireless operator interface is authenticated
with an HMAC SHA-1 keyed hash digest and encrypted with the AES encryption
algorithm (both algorithms are described in detail in the HMAC SHA-1 Authentication
Overview and AES Overview sections above). As shown in Figure C.4, the SEL-3022
first forms the HMAC SHA-1 hash output from the original frame data payload and the
128-bit authentication key. This keyed message fingerprint is then appended to the end
of the frame data payload, and the resulting composite message is encrypted by the
AES encryption function through use of a separate, 128-bit encryption key (the
authentication key and encryption key are completely independent).
Figure C.4 SEL-3022 Security Application Overview
Upon receipt of any frame on the wireless operator interface, the SEL-3022 uses the
programmed 128-bit secret encryption/decryption key to AES decrypt the entire frame.
The SEL-3022 then uses the programmed 128-bit authentication key to calculate the
Authentication Key
Encryption Key
Final Encrypted and
Authenticated Frame
Message
Message Message
HMAC
Hash
HMAC
Hash
HMAC
Hash
HMAC
Function
AES
Encryption
Preliminary Copy