User's Manual
Table Of Contents
- Table of Contents
- List of Tables
- List of Figures
- Figure1.1 Typical SEL3022 and SEL5810 Virtual Serial Software Application 1.2
- Figure1.2 Encrypted Packet Stream 1.4
- Figure1.3 Typical Connections for the SEL3022 1.6
- Figure1.4 Typical Alarm Output Installation 1.8
- Figure2.1 SEL3022 Dimension Drawing 2.2
- Figure2.2 Windows Run Command 2.3
- Figure2.3 Product Unregistered Prompt 2.4
- Figure2.4 Select a Device Type to Create 2.7
- Figure2.5 Specify New Device Location 2.8
- Figure2.6 Opening Device 2.8
- Figure2.7 Identification Screen 2.9
- Figure2.8 Status: Device 2.10
- Figure2.9 Settings: Wireless 2.10
- Figure2.10 Settings: WEP Keys 2.11
- Figure2.11 Settings: User 2.11
- Figure2.12 Settings: Operator 2.12
- Figure2.13 Settings: Security Officer 2.12
- Figure2.14 Confirm Send Prompt 2.13
- Figure2.15 Send Operation Message 2.13
- Figure2.16 Select Items to Print 2.14
- Figure2.17 Print Window 2.14
- Figure3.1 Remotely Located Recloser Control 3.2
- Figure3.2 Job Done Example SEL-5809 Top Level View 3.3
- Figure3.3 Select a Wireless Session for DNP3 Job Done Example 3.4
- Figure3.4 Settings: DCE Port 3.4
- Figure3.5 Status: Virtual Serial Port With Connection Status Red 3.5
- Figure3.6 Communication Parameters Window in acSELerator 3.6
- Figure3.7 Status: Virtual Serial Port With Connection Status Green 3.6
- Figure3.8 Reading Settings Via the SEL3022 3.7
- Figure3.9 Monitoring SEL651R Meter Data Via the SEL3022 3.8
- Figure3.10 Status: Virtual Serial Port Connection Status Red 3.9
- Figure3.11 Specify Device to Export to SEL5810 Virtual Serial Software 3.10
- Figure3.12 Export Encrypted User Configuration File 3.10
- Figure3.13 Store Encrypted File 3.11
- Figure3.14 Password Prompt in SEL5810 Virtual Serial Software 3.12
- Figure3.15 Communication Parameters Window in acSELerator 3.13
- Figure3.16 Reading SER Report Via acSELerator 3.14
- FigureB.1 PC to SEL3022 Connection B.2
- FigureB.2 SEL3022 and SEL-5809 Connection Parameters B.2
- FigureB.3 SEL5809 Settings Software Connection Method B.3
- FigureB.4 SEL-5809 Opening Connection B.3
- FigureB.5 Status: Device Window B.4
- FigureB.6 Confirmation Prompt B.4
- FigureB.7 Send Operation Prompt B.4
- FigureB.8 Configuring Serial Port Settings in the Terminal Software B.5
- FigureB.9 Send File Prompt B.6
- FigureB.10 Sending Confirmation Window B.6
- FigureB.11 Terminal Invalid Firmware Error Message B.7
- FigureB.12 Terminal Valid Firmware Message B.7
- FigureC.1 Two Independent Layers of Cryptographic Security Protect the SEL3022 Wireless Operato...
- FigureC.2 Operation of the HMAC SHA-1 Keyed Hash Authentication Function C.9
- FigureC.3 Operation of the AES Encryption Function C.10
- FigureC.4 SEL3022 Security Application Overview C.11
- FigureC.5 Wireless Interface Session Authentication Dialog C.15
- Preface
- Introduction & Specifications
- Installation
- Job Done Example
- Settings and Commands
- Testing and Troubleshooting
- Firmware and Manual Versions
- Firmware Upgrade Instructions
- Wireless Operator Interface Security
- Introduction
- Wireless Interface Security Overview
- IEEE 802.11 WEP Security
- The SEL Security Application
- Certificates
- Glossary
SEL-3022 Transceiver Instruction Manual Date Code 20050615
Wireless Operator Interface Security
The SEL Security Application
C.12
Cryptographic Manual—Do Not Copy
HMAC SHA-1 keyed hash value over the payload (message) portion of the received
frame. If the calculated HMAC SHA-1 hash output does not match the received
message fingerprint, the SEL-3022 rejects the message and terminates the session.
This arrangement protects the original frame data payload from malicious alteration,
authenticates the origin of the frame as a device with knowledge of both the encryption
and authentication keys, and protects the contents of the frame data payload from theft.
SEL Security Application Analysis
Cryptographic experts have analyzed the AES and HMAC SHA-1 cryptographic
functions. This analysis process began before NIST accepted each of the functions as
standards, and it will continue as long as these standards remain in use. To date, the
AES encryption and HMAC SHA-1 authentication algorithms have withstood all
public scrutiny in the sense that they provide the advertised level of security. In other
words, an AES encryption function with a 128-bit key will, by all analysis to date,
provide data confidentiality at a cryptographic strength of 128 bits (the discussion in
the following text addresses this concept). Cryptographically sound hash functions,
such as SHA-1, are expected to provide message integrity functionality at a strength
equal to half the size of the hash output. Because SHA-1 has a hash output length of
160 bits, it should produce message integrity functionality at a cryptographic strength
of 80 bits. To date, SHA-1 has maintained the expected cryptographic strength. Finally,
the HMAC function has also withstood all cryptographic analysis, in the sense that it
has proven to be an effective and secure method of mixing a secret authentication key
into the SHA-1 hash output. We will analyze the implications of these statements in the
following text.
As stated previously, the AES encryption function has, thus far, provided data
confidentiality at a cryptographic strength equal to the size of the encryption key. To
successfully guess a 128-bit key, such as the key the SEL-3022 uses, an attacker would
have to try an average of 2
127
= 1.7 • 10
38
keys before finding the correct value
(assuming that all key values are equally likely). This is a staggering number of
potential key values! If an attacker could test one million potential keys per second, it
would take more than 5.39 • 10
24
years, on average, to guess the correct key value
(note that the universe is estimated to be only 10
13
years old)! In reality, the time that it
would take to launch an effective key guessing attack against the SEL-3022 would be
even longer, because the wireless interface on the SEL-3022 times out briefly when an
authentication failure occurs. Because of the wireless interface timeout, the maximum
rate of a key guessing attack against the SEL-3022 is much less than one million keys
per second.
Because the SEL Security Application AES encrypts the HMAC-keyed authentication
digest in every frame, both the AES encryption key and the HMAC SHA-1
authentication key must be compromised simultaneously to send data to the SEL-3022.
For such a situation, an attacker would have to guess two independent 128-bit key
values, which is the same as guessing a single, 256-bit key. To guess a key of this size,
an attacker would, on average, have to make 2
255
= 5.79 • 10
76
key guessing attempts.
If an attacker could test one million potential keys per second, it would take more than
Preliminary Copy