HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (19 Oct 2025)

GBZ25320.5-2013 English PDF

US$1014.00 · In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email.
GBZ25320.5-2013: Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB/Z 25320.5-2013English1014 Add to Cart 3 days [Need to translate] Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives Valid GB/Z 25320.5-2013

PDF similar to GBZ25320.5-2013


Standard similar to GBZ25320.5-2013

GB/T 40427   GB/T 40588   GB/T 33593   GB/T 25320.4   GB/T 25320.6   GB/T 25320.11   

Basic data

Standard ID GB/Z 25320.5-2013 (GB/Z25320.5-2013)
Description (Translated English) Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives
Sector / Industry National Standard
Classification of Chinese Standard F21
Classification of International Standard 29.240.01
Word Count Estimation 51,515
Quoted Standard IEC 60870-5-101; IEC 60870-5-102; IEC 60870-5-103; IEC 60870-5-104; IEC/TS 62351-1; IEC/TS 62351-2; IEC/TS 62351-3; ISO/IEC 9798-4; FIPS 186-2; FIPS 197; FIPS 198-1; RFC 2104; RFC 3174; RFC 3394; RFC 3629
Adopted Standard IEC/TS 62351-5-2009, IDT
Regulation (derived from) National Standards Bulletin 2013 No. 2
Issuing agency(ies) Ministry of Health of the People's Republic of China
Summary This standard specifies the messages used in the process and algorithms. This section applies at least listed in Table 1 of the agreement.

GBZ25320.5-2013: Power systems management and associated information exchange -- Data and communications security -- Part 5: Security for GB/T 18657 and derivatives


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Power systems management and associated information exchange. Data and communications security. Part 5. Security for GB/T 18657 and derivatives ICS 29.240.01 F21 People's Republic of China national standardization of technical guidance documents Power System Management and Information Exchange Data and communications security Part 5. GB/T 18657 and so on Derivative standard safety Powersystems management and associated information exchange- Part 5.SecurityforGB/T 18657andderivatives (IEC /T S62351-5.2009, IDT) 2013-02-07.2013-07-01 implementation General Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China China National Standardization Administration released Directory Foreword Ⅲ Introduction IV 1 Scope and purpose 1 1.1 Scope 1 1.2 Expected readers and uses 1 1.3 beyond the scope of this section 1 1.4 Used with other standards 1 1.5 File Structure and Research 2 1.6 Consistency 2 2 Normative references 2 3 Terms and definitions 3

4 abbreviation

5 Problem Description 3 5.1 Overview 3 5.2 Specific threats to deal with 4 5.3 Design problems faced 4 5.4 General principles 6 6 certification operation theory (informative) 8 6.1 Overview 8 Descriptive description 6.3 Message Sequence Example 10 6.4 State Machine Overview 14 7 Formal Specification 16 7.1 Overview 16 7.2 Message Definition 16 7.3 The formal process 28 Interoperability Requirements 8.1 Overview 40 8.2 Minimum Requirements 40 8.3 Optional 42 Special applications 43 9.1 Overview 43 9.2 Using TCP/IP 43 9.3 Use of redundant channels 43 9.4 Using an External Link Encryption Machine 10 reference to the requirements of this section 43 10.1 Overview 43 10.2 Selected Options 43 10.3 Think Key Operations 43 10.4 Address Information 43 10.5 Information Format Mapping 44 10.6 Reference to Procedures 44 11 Agreement Declaration of Consensus Achieved 44 11.1 Overview 44 11.2 Required Algorithms 44 11.3 HMAC Algorithm 44 11.4 Key Encryption Algorithm 11.5 Maximum error count 44 11.6 The Use of Error Messages 44 References 45

Foreword

GB /Z 25320 "power system management and information exchange data and communications security" is divided into the following sections. --- Part 1. Introduction to communication network and system security and safety issues; --- Part 2. Terms; --- Part 3. Communication network and system security including TCP/IP protocol set; --- Part 4. Protocol set containing MMS; --- Part 5. GB/T 18657, etc. and their derivatives standards of security; --- Part 6. Power enterprise automation communication network and system security; --- Part 7. Network and system management data object model; --- Part 8. Role-based access control of power system management. This section GB /Z 25320 Part 5. This section drafted in accordance with GB/T 1.1-2009 given rules. This section uses the translation method identical with IEC /T S62351-5.2009 "Power System Management and its information exchange data and communications security Full Part 5. IEC 60870-5 and its derivatives standards of safety. " The documents of our country that are consistent with the corresponding international documents that are normative references in this section are as follows. --- GB /Z 25320.1-2010 Power system management and information exchange - Data and communications security - Part 1. Communication networks And system safety and security issues (IEC /T S62351-1.2007, IDT) --- GB /Z 25320.2-2013 Power system management and its exchange of information data and communications security Part 2. Terminology (IEC /T S62351-2.2008, IDT) --- GB /Z 25320.3-2010 Power system management and its exchange of information data and communications security Part 3. Communication network And System Security Including TCP/IP Protocol Set (IEC /T S62351-3.2007, IDT) --- DL/T 634.5101-2002 Telecontrol equipment and systems Part 5-101. Transmission protocol Basic Telecontrol tasks supporting standard Standard (IEC 60870-5-101.2002, IDT) --- DL/T 719-2000 Telecontrol equipment and systems Part 5. Transmission protocol Article 102. Accumulation of electric energy in electric power system Transmission standards (IEC 60870-5-102.1996, IDT) --- DL/T 667-1999 Telecontrol equipment and systems Part 5. Transmission protocol Part 103. Relay equipment information access Mouth supporting standards (IEC 60870-5-103.1997, IDT) --- DL/T 634.5104-2009 Telecontrol equipment and systems Section 5-104. Transmission protocol using standard transmission protocol set IEC 60870-5-101 Network Access (IEC 60870-5-104.2006, IDT) This part is proposed by China Electricity Council. This part of the National Power System Management and Information Exchange Standardization Technical Committee (SAC/TC82) centralized. This section drafted unit. Huazhong Power Grid Co., Ltd., State Grid Electric Power Research Institute, the State Power Dispatching and Communication Center, China Electric Power Science Research Institute, China Southern Power Grid, East China Power Grid Co., Ltd., Fujian Provincial Electric Power Co., Ltd., Liaoning Provincial Power Co., Ltd. The main drafters of this section. Han Shuibao, Xu Mu Liang, Yangqiuheng, Nan Guilin, Zhang Tao, Zhou Peng, Li Genwei, Deng Zhaoyun, Cao Lianjun, Ma Xiao, Jiang Chengzhi.

Introduction

Computer, communications and networking technologies are currently widely used in power systems. There are various kinds of information in communications and computer networks Possible security attacks pose a threat to the security of data and communications in power systems. These potential possible attacks target the power system Security vulnerabilities in communication protocols at various levels of the system and imperfections in the security management of power system information infrastructure. To this end, we adopted the international standard to develop GB /Z 25320 "Power System Management and its information exchange data and communication security", pass Over the relevant communication protocols and in the information infrastructure management to add specific security measures to enhance and enhance the power system data and Communication security. Power System Management and Information Exchange Data and communications security Part 5. GB/T 18657 and so on Derivative standard safety

1 Scope and purpose

1.1 Scope For the purpose of any and every application that is based on or derived from IEC 60870-5 (GB/T 18657 "Telecontrol Equipment and Systems Part 5. Transmission Specifications") Agreement for the operation of security, GB /Z 25320 provisions of this section used by the message, process and algorithm. This section applies at least Table 1 lists the agreement. Table 1 applies the scope of the standard Number Name IEC 60870-5-101 basic mission supporting mission IEC 60870-5-102 Power system electrical energy metering transmission supporting standards IEC 60870-5-103 relay protection equipment information interface supporting standards IEC 60870-5-104 IEC 60870-5-101 Network access using standard transmission protocol set DNP3 distributed network protocol (based on IEC 60870-1 to IEC 60870-5 and controlled by DNP user group) 1.2 prospective readers and purposes This section of the initial reader is expected to develop the agreement listed in Table 1 working group staff. In order for the measures described in this section to take effect, The protocol specification itself must adopt and cite these measures. This section is written to enable this process. Subsequent readers of this section are expected to be product developers implementing these protocols. Portions of this section are also useful for managers and administrators to understand the purpose and needs of the job. 1.3 beyond the scope of this section According to the directives of Working Party 3 of IEC 57, this part of IEC 62351 focuses only on application-level certification and the resulting certification Health and safety issues. Other issues involved in security protection, especially through the use of encryption to prevent eavesdropping and man-in-the-middle attacks To exceed the scope of this section. Through the use of this standard in conjunction with other specifications, you can add encryption. 1.4 Used with other standards Working groups that develop the protocols listed in Table 1 may publish standards that are used in conjunction with this section. Requirements These standards should describe the certification machine The mapping of messages and procedures for each particular protocol. These documents should not disregard any of the mandatory and prescriptive safety measures described in this section. When used in IEC 60870-5-104, this section should be used in conjunction with IEC /T S62351-3.

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GBZ25320.5-2013_English be delivered?

Answer: Upon your order, we will start to translate GBZ25320.5-2013_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GBZ25320.5-2013_English with my colleagues?

Answer: Yes. The purchased PDF of GBZ25320.5-2013_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.