EP2520043A1 - Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels - Google Patents

Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels

Info

Publication number
EP2520043A1
EP2520043A1 EP11704055A EP11704055A EP2520043A1 EP 2520043 A1 EP2520043 A1 EP 2520043A1 EP 11704055 A EP11704055 A EP 11704055A EP 11704055 A EP11704055 A EP 11704055A EP 2520043 A1 EP2520043 A1 EP 2520043A1
Authority
EP
European Patent Office
Prior art keywords
key
cryptographic
control unit
configuration memory
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP11704055A
Other languages
German (de)
English (en)
French (fr)
Inventor
Rainer Falk
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens AG
Original Assignee
Siemens AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens AG filed Critical Siemens AG
Publication of EP2520043A1 publication Critical patent/EP2520043A1/de
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0428Safety, monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/36Nc in input of data, input key till input tape
    • G05B2219/36542Cryptography, encrypt, access, authorize with key, code, password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the invention relates to a method and a device for providing at least one secure cryptographic key for the execution of a cryptographic security function by a control unit.
  • the control devices are provided with cryptographic keys for executing a cryptographic security function.
  • Such cryptographic keys are often configured manually, that is, a value for the respective cryptographic key is entered via an input mask.
  • the kryp ⁇ tographischen keys are for example guration inserted into a Confi- or entered using a configuration tool.
  • the cryptographic protection provided by a cryptographic key depends on the length and entropy of the cryptographic key used. The longer the cryptographic key is used and the higher its entropy or randomness therein USAGE ⁇ Deten mark, the greater is usually the strength attained by the cryptographic key cryptographic protection function. For example, a long cryptographic key with a large number of special characters has a relatively high cryptographic protection.
  • the invention provides a device for providing at least one secure cryptographic key for the execution of a cryptographic security function by a control unit requesting a cryptographic key for this purpose, wherein a configured one of a first configuration memory provided for the security function
  • Key is read and is checked on the basis of the read out configured key, whether in a second configuration memory configured to one
  • the cryptographic keys may be a any desired string of numbers, letters and Sonderzei ⁇ chen, especially for passwords.
  • control device has a calculation unit which executes the cryptographic security function by encrypting or decrypting data with the provided cryptographic key or by calculating or checking cryptographic checksums.
  • access is made to the first configuration memory and to the second configuration memory by a user as a function of access authorizations to the respective configuration memory.
  • an access authorization to the second configuration memory exists only for a system administrator.
  • a secure replacement key to a Si ⁇ cherheitsfunktion by means of a key derivation function KDF (Key Derivation Function) is calculated ter sayl automatically in accordance with the configured security functions for the key and a mass.
  • a secure replacement key to acampti ⁇ on by a user with an access permission is registered for access to the second configuration memory in the second configuration memory.
  • the configured key is provided to the controller for Ausu ⁇ tion of the security function, with a corresponding warning is generated if no associated secure spare key is stored in the second configuration memory for the configured key read from the first configuration memory.
  • the replacement key has a higher information entropy and / or a larger key length than an associated, configured key.
  • the configured key is entered by a user with an access authorization for accessing the first configuration memory for the security function of the control unit.
  • control device is connected to an automation network of an automation system.
  • more cryptographic secure ⁇ safety functions are executable by the control unit, for at least a cryptographic key is used.
  • the device according to the invention are useful in the automation system for its configuration, its construction, the maintenance and operation thereof differing ⁇ che security requirements provided by the set up by the control unit of the automation system to execute security functions ⁇ cryptographic key.
  • the device it is checked whether the device tion of the respective security function provided cryptographic key of a currentforceanfor ⁇ tion of the automation system is sufficient.
  • the invention further provides a method for providing a secure cryptographic key having the features specified in claim 14.
  • the invention provides a method for providing a secure cryptographic key for executing a cryptographic security function by a control unit requesting a cryptographic key for this purpose, wherein a configured key intended for the security function is read from a first configuration memory and configured on the basis of the readout
  • the invention further provides an automation network with a plurality of control devices having the features specified in claim 15.
  • the invention provides an automation network with a plurality of control devices for controlling components of an automation system
  • control device for executing a cryptographic security function each receive at least a cryptographic key from a connected with the respective control unit key providing device, wherein the key providing apparatus at least provides a secure cryptographic key for performing a cryptographic security function by a control device for requesting a cryptographic Keyring ⁇ sel , wherein from a first configuration memory configured for the security function configured Key is read and is checked by means of the read out configured key, whether in a second configuration memory stored to the read out configured key associated secure spare key, which is provided instead of the configured key for the execution of the safety function to the control unit.
  • Components of the automation system Components of a production control, in particular robot arms, welding machines, production actuators and manufacturing sensors, as well as components of a traffic control, components of an energy distribution control, components of a transport control, components of a process control and components of an apparatus control.
  • Fig. 1 is a block diagram illustrating a possible
  • Embodiment of the device according to the invention for providing at least one secure cryptographic key for providing at least one secure cryptographic key
  • FIG. 2 shows an example for an inventive automation ⁇ approximately network having a plurality of control devices for actuation of components of an automation system.
  • FIG. 3 is a block diagram of an automation communication device, the automation shown in FIG. s istsnetztechnik is provided and which has a device according to the invention for providing a cryptographic key; 4 shows a diagram for illustrating a configuration interface for explaining advantages of the device according to the invention and of the method according to the invention; a diagram illustrating a configuration interface according to a possible embodiment of the inventive device and the method according to the invention for providing secure cryptographic keys; a diagram illustrating a configuration interface in a further embodiment of the inventive device and the method according to the invention for providing secure cryptographic keys;
  • FIG. 7 shows a diagram for illustrating a configuration interface in a further embodiment of the device according to the invention and of the method according to the invention for providing secure cryptographic keys.
  • an inventive device 1 for providing at least one secure cryptographic key to a control unit 2 may be integrally Schlos ⁇ sen.
  • the control unit 2 can execute and control a cryptographic Si ⁇ cherheitsfunktion SF.
  • the control unit 2 requires at least one cryptographic key SFK (Security Function Key).
  • SFK Security Function Key
  • the cryptographic key may be a sequence of characters insbesonde ⁇ re numbers, letters and special characters.
  • the cryptographic key can also be a required password be.
  • the control unit 2 can control a device or a component 4 in one possible execution ⁇ form for one or more control cables 3, of which the security function SF is executed.
  • the controlled device or the controlled component 4 can contain a calculation unit, for example a microprocessor or a cryptographic chip, in order to execute a safety function SF as a function of a cryptographic key SFK.
  • the control unit 2 as shown in Fig. 1, a calculation ⁇ -drying unit 5 which performs the cryptographic security ⁇ function SF.
  • This calculation unit 5 can also be a microprocessor or an application-specific integrated ASIC or chip.
  • the cryptographic security function SF is executed by encrypting or decrypting data with a provided cryptographic key.
  • the cryptographic security function SF may also be carried out by a cryptographic checksum calculated or ge ⁇ is checked.
  • the controller 2 issues this request or request SFK for a cryptographic key SFK for executing a security function SF via an interface to the key providing device 1 according to the invention.
  • the interface between the controller 2 and the device 1 may be a wireless or a wired interface.
  • control unit 2 is connected to the device 1 via a network.
  • the device 1 may be connected to a plurality of control devices 2.
  • the device 1 receives a message from the control unit 2, in which a cryptogram tographic key is requested. The over the
  • Interface received message is received by a unit 6.
  • the unit Once the unit has 6 catch the request message R SFK to Anfor ⁇ alteration of a security key from the control unit 2 emp ⁇ , it reads from a first configuration memory 7 from an intended for the particular security function SF configured key CK, as shown in FIG. 1. Based on the read out configured key CK is then checked by the unit 6, whether in a second configuration memory 8 is stored to the read-out configured key CK secure backup key SK is stored. If this is the case, the associated secure spare key SK from the second configuration ⁇ memory 8 is read out and set instead of the configured key CK for the execution of the security function SF control unit 2 via the interface as the key SK ready ⁇ .
  • the two cryptographic configuration memories 7, 8 can be two separate data memories or separate memory segments of the same data memory.
  • the first configuration memory 7 and the second configuration memory 8 are accessed by a user as a function of access authorizations to the respective configuration memories 7, 8.
  • only one system administrator has access authorization the second configuration memory 8 in which the secure spare keys SK associated with the configured keys CK are stored.
  • the replacement key SK has in each case a higher information ⁇ onsentropie and a larger key length than a konfiguru- rier key CK, which is stored in the first configuration ⁇ memory 7.
  • the secure spare key SK can thus be a long, relatively complex cryptographic key with a high number of hard noticeable special characters, which offers a high degree of cryptographic protection.
  • the configured key CK which is stored in the first configuration memory 7, in one possible embodiment can be accessed by a user A with access authorization for accessing the first configuration memory 7 for a respective safety function SF of a control unit 2 via a user interface of the device 1 be registered.
  • these user interface parts can also be used to enter the associated secure replacement key SK by another user B with access authorization to access the second configuration memory 8 in the second configuration memory 8.
  • This user B may, for example, be a system administrator with access authorization for the second configuration memory 8.
  • the configured key CK is figured kon ⁇ via a first configuration interface and the second associated spare key SK via a second configuration interface. Access to the first configuration interface and access to the second configuration interface may be subject to various restrictions or security controls.
  • the second configuration ⁇ interface or call and vice versa User who is allowed to make the configuration setting at the first configuration interface can not be used at a mög ⁇ handy embodiment, the second configuration ⁇ interface or call and vice versa.
  • further configurations may possibly be made via the first configuration interface .
  • the second configuration interface is designed such that it allows only the configuration of the key value or of the secure replacement key SK. In this way, Si ⁇ cherheitsadministrator can gain access to the second configuration memory 8, without having to know the other configuration settings.
  • the configured key CK is provided to the controller 2 for executing the safety function SF.
  • the device 1 can give the control unit 2 a corresponding warning that no associated secure spare key SK is present.
  • the secure replacement key SK for a safety function SF is automatically calculated using a key derivation function KDF (Key Derivation Function) as a function of the key CK configured for the safety function SF with a master key MK.
  • KDF Key Derivation Function
  • the secure replacement keys SK are not entered in the second configuration memory 8, but automatically calculated by a calculation unit by means of a key derivation function KDF and written in the second configuration memory 8.
  • the key derivation function KDF can, as shown in FIG. 1, be stored in an internal memory of the unit 6.
  • a master key or Mas ⁇ more excellent reduction key MK with a key value for the safe replacement key SK is derived using the key derivation function KDF is entered via the two-te configuration interface.
  • an HMAC function in particular an HMAC-SHA1 (Master Key, first key value), for example, be used.
  • HMAC-SHA1 Master Key, first key value
  • KDF Key removal ⁇ forwarding function
  • the Key derivation function KDF is configurable or time-changeable.
  • several safe replacement key SK in the two ⁇ th configuration memory 8 are provided for each configured key CK.
  • these different backup spare keys SK provided for each time are made available to the control unit 2 one after the other for each request SF SFK for a safety function SF. In this way, the control unit 2 always receives a different or newer secure replacement key SK when performing a multiple security function SF.
  • These different secure replacement keys SK can be automatically derived in a possible embodiment with different key derivation functions KDF from a master key MK.
  • the secure replacement keys SK are already stored in the configuration memory 8 after receiving a request R SFK for carrying out a security function.
  • the secure spare keys SK are generated only after receiving a request R SFK .
  • the control unit 2 and the device 1 communicate via an interface .
  • the device 1 for providing a secure cryptographic key for the execution of the cryptographic security function SF by the control unit 2 can also be integrated in the control unit 2.
  • the device 1 via an interface in the control ⁇ device 2 can be inserted. As shown in FIG. 1, the control unit 2 can control a device or a component 4 or, in a further variant, several components 4.
  • the control unit 2 can in turn be integrated in the component 4 to be controlled.
  • the component 4 to be controlled may be a component of an automation system.
  • the component 4 may be a component of a Vietnamesessteue ⁇ tion, in particular a robot arm to be controlled, a welding machine, manufacture actuators and production sensors.
  • the component 4 may be a component of a traffic control, a component of an energy distribution control, a component of a transport control, a component of a process control or even a component of an apparatus control.
  • In the apparatus 1 for providing a secure cryptic tographischen key 1 can be a fixed installation, but also to a mobile device, which com municates ⁇ via a wireless interface with the control unit.
  • the control device 2 can be a networked industrial control device, for example an 802.1ae / af MACSEC, IPsec, SSL / TLS, WLAN, 802.15.4, ZigBee, Bluetooth or Wireless HART device.
  • the control unit 2 can be connected to a network of an automation system.
  • Several cryptographic security functions SF may be performed by the control unit 2, which is incorporated ⁇ for at least a cryptographic key is SFK.
  • the construction, the maintenance and operation thereof may have different security requirements for the set up by the control unit 2 of the automation system to the off ⁇ execution of safety functions SF cryptic tographischen key SFK be provided.
  • a lower security requirement can be provided than in the actual operation of the automation system, since the operation is generally more safety-critical than the structure of the automation system.
  • the controller 2 may in a possible embodiment, a further request or a request R to the device 1.
  • a plurality of secure replacement keys SK can be stored in the second configuration memory 8 for a configured key CK, which satisfy different security requirements or security requirement levels.
  • FIG. 2 shows an example of an automation network with a plurality of control devices for controlling components of an automation system, in which the device according to the invention and the inventive method for providing at least one secure cryptographic key for executing cryptographic security functions SF can be used.
  • an office or office network O-NW is connected via a firewall FW to an industrial network I-NW, which in the illustrated example has two production cells FZ1, FZ2.
  • an access point AP is provided on the industrial network I-NW.
  • the two manufacturing cells FZ1, FZ2 each have a security module SM1, SM2 to protect the respective manufacturing cell FZ.
  • Both manufacturing cells FZ1, FZ2 each have a local bus which connects a plurality of sensors / actuators S / A with the robot arm RA or an automatic welding machine SWA.
  • the robot arm RA, the production cell FZ1 and the welding machine SWA in the manufacturing cell FZ2 and the security modules SM, for example security gateways, as well as sensors or actuators represent components 4, which can be controlled by a control unit 2, as shown in FIG have an integrated control unit 2.
  • These components 4 of the Automation network are to be partially configured, and this can be done in a possible configuration of a directly to the respective component 4 configurable ⁇ computer.
  • the configuration of a component 4 takes place via a configuration computer connected by means of a network, which is also referred to as a configuration computer.
  • remote access to a configuration computer available in the industrial network I-NW or in the office network O-NW is possible.
  • Fig. 3 shows a block diagram of a possible execution ⁇ form for a control unit 2.
  • This control unit 2 is an automation communication device AKG, which may be connected via a network interface NW-INT with the automation ⁇ network.
  • the Automatmaschineskommunika- tion device AKG has a microprocessor or Kommunikati ⁇ onsreaor CPU.
  • the automation communication device AKG can have an input / output unit I / O via which, for example, sensors or actuators can be connected to the automation communication device AKG.
  • the CPU can execute a program that is stored in a program memory PS and access data stored in a working memory ⁇ AS.
  • the automation communication device AKG forms a control unit 2 for controlling an arbitrary component 4 within the automation network.
  • FIG. 1 shows a block diagram of a possible execution ⁇ form for a control unit 2.
  • the control unit 2 includes an integrated device 1 for providing a secure cryptographic key for the execution of a cryptographic security function SF by the control unit 2.
  • the control unit 2 has a configuration interface or a configuration In ⁇ terface C-INT on.
  • a first configuration memory 7 and a second configuration memory 8 are located in the device 1.
  • a configured key CK provided for the safety function SF is stored in the first configuration memory 7.
  • the CPU or the calculation unit 5 of the controller 2 for a cryptographic security function SF for example, encryption of data or a calculation of a cryptographic checksum for a component 4 of the automation ⁇ tleitersnetztechnikes executes, it can request a corresponding cryptographic key in the device.
  • a configured key CK provided for the safety function SF is read from the first configuration memory 7 of the device 1 and checked based on the read out configured key CK whether in the second configuration memory 8 a secure spare key SK associated with the read-out configured key CK is stored. is chert.
  • the secure replacement key SK is read from the second configuration memory 8 and provided to the CPU or the calculation unit 5 of the automation communication device 2 or the control unit 2 instead of the configured key CK for the execution of the safety function SF of the control unit 2 ,
  • the two configuration memories 7, 8 are accessed via the configuration interface C-INT. In this case, the access to the two configuration memories 7, 8 in dependence on different
  • Access permissions are granted. In one possible embodiment, only one system administrator has access to the second configuration memory 8 within the key delivery device 1.
  • Fig. 4 shows a diagram illustrating a first configuration interface for inputting a Radiokonfigurati ⁇ on BK comprising more configured key CK.
  • a conformity via an input mask among other parameters, such as IP addresses, times and dates, and port settings ⁇ also configured key CK, especially for safety functions SF, can be input.
  • a WSAN join key, a WLAN PSK (pre-shared key) and a control server key are input via the configuration interface shown in FIG. 4 into the key supply device 1 according to the invention.
  • the input can be made manually, for example, by a user on site.
  • the 4 configured key CK can be stored for example in the first Configurati ⁇ ons acknowledged 7 of the device 1.
  • the keys CK may, for example, weak key is to act with little key length that are just noticeable, particularly for technicians who move within the Au ⁇ tomatmaschinesstrom.
  • the commissioning of an automation system with a ⁇ times manageable configured keys CK can thus be worked currency ⁇ rend. Only when the system goes into operative operation at a later time are strong Excellenceschlüs ⁇ sel SK configured and used.
  • Fig. 5 is a diagram showing another input template for the configuration interface in the OF INVENTION ⁇ to the invention key providing device 1.
  • This screen can be used for each configured key CK provide a substitute key field, in which a safe substitute key SK can be input.
  • only one user with special access rights, in particular a security administrator of the network has access to the input mask illustrated in FIG. 5.
  • the user or security administrator can enter an associated secure replacement key SK for each simple configured key CK.
  • the spare key SK a higher Informationsentro ⁇ pie and a longer key length than the associated confi gured ⁇ normal operating key CK.
  • the configured key CK is usually a simple, short, easily recognizable cryptographic key, whereas the associated spare key SK is a relatively long complex cryptographic key comprising a plurality of special characters and relatively difficult to remember is.
  • the configured operating key CK is entered by a first user A, eg a technician installing and commissioning the automation system, and the secure replacement key SK is entered by a second user B, in particular a security administrator with special
  • the configured spare key SK is not recognizable to the first user A, and in many cases the first user A does not know about the existence of the associated configured security key SK.
  • the input of the operating key or of the configured simple key CK by a user A takes place locally at the respective control unit 2 via a corresponding configuration interface.
  • the associated security key and replacement key SK is a second user B is not input, for example, a security administrator locally at the control unit 2, but remote from a remote terminal, which is connected to the control unit 2 via a network.
  • the user A who is for example in technicians for the commissioning of the system, thus does not need to know and configure the strong spare key, but he can still install the automation system and put into operation.
  • an associated spare key SK is entered by a system administrator.
  • a safety function SF namely VPN PSK
  • no associated secure replacement key SK ishimge ⁇ ben in the appropriate field.
  • the configured key CK in the event that no associated secure spare key SK is stored in the second configuration memory 8 for the configured key CK stored in the first configuration memory 7, the configured key CK will be the respective control unit 2 for executing the safety function SF - Semi asked.
  • a user additionally receives a corresponding audible or visual warning .
  • a system administrator can obtain ei ⁇ nen hint that a cryptographic key is required for a safety function SF, with no associated secure replacement key SK is defined.
  • Fig. 6 shows a further input mask of a configuration ⁇ sections of the key providing apparatus according to the invention 1.
  • a Systemadmi- are not trator to any normal configured key CK an associated spare key SK a, but only a master key MK.
  • the system administrator can, for example, by clicking a button on the mask from a master key MK automatically by means of a
  • Key CK can be calculated or generated by corresponding spare keys SK. These are then displayed in the corresponding substitute key field. In a possible exporting ⁇ approximate shape the system administrator can then edit the derived safe replacement key SK.
  • the spare key SK is in this embodiment with a
  • Key derivation function KDF depending on the configured key CK and the master key MK automatically ⁇ calculated or derived.
  • Fig. 7 is a diagram showing another exemplary form of the configuration interface in the OF INVENTION ⁇ to the invention the device 1 for providing secure cryptographic keys.
  • the automatic various keys are provided.
  • different cryptographic keys K are activated (A) or modified (M) for the phases P configuration PI, service P2 and operation P3.
  • the system administrator has the opportunity to generate a new set of cryptographic keys K for the respective phase P of the automation system.
  • CNK Create New Keys
  • the keys can then be replaced by a plant security administrator by strong or secure replacement key SK at a later time, when the automation system is in the operating mode over ⁇ .
  • the device 1 according to the invention and the method according to the invention are not only suitable for providing secure cryptographic keys, but also for providing secure passwords, for example in the authentication or authorization of a user with respect to a system.
  • a new replacement key after executing a security function SF, a new replacement key automatically becomes Derived or calculated SK.
  • the method according to the invention and the device 1 according to the invention can be used in a variety of ways.
  • the key providing device 1 according to the invention is suitable not only for control units 2 of a production control, but also for other controllable components or devices, in particular in the field of traffic control, energy distribution control, transport control, process automation and apparatus control.
  • the provision of the cryptographic keys as well as the execution of the cryptographic security function SF takes place in one possible embodiment by the device 1 according to the invention in real time.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)
  • Safety Devices In Control Systems (AREA)
  • Programmable Controllers (AREA)
  • Testing And Monitoring For Control Systems (AREA)
  • Selective Calling Equipment (AREA)
EP11704055A 2010-03-17 2011-02-14 Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels Withdrawn EP2520043A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102010011657A DE102010011657A1 (de) 2010-03-17 2010-03-17 Verfahren und Vorrichtung zum Bereitstellen mindestens eines sicheren kryptographischen Schlüssels
PCT/EP2011/052097 WO2011113651A1 (de) 2010-03-17 2011-02-14 Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels

Publications (1)

Publication Number Publication Date
EP2520043A1 true EP2520043A1 (de) 2012-11-07

Family

ID=43924510

Family Applications (1)

Application Number Title Priority Date Filing Date
EP11704055A Withdrawn EP2520043A1 (de) 2010-03-17 2011-02-14 Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels

Country Status (6)

Country Link
US (1) US8989386B2 (zh)
EP (1) EP2520043A1 (zh)
KR (1) KR20130045260A (zh)
CN (1) CN102792629A (zh)
DE (1) DE102010011657A1 (zh)
WO (1) WO2011113651A1 (zh)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010011657A1 (de) 2010-03-17 2011-09-22 Siemens Aktiengesellschaft Verfahren und Vorrichtung zum Bereitstellen mindestens eines sicheren kryptographischen Schlüssels
US8806209B2 (en) * 2012-12-22 2014-08-12 Wigwag, Llc Provisioning of electronic devices
CN103490895B (zh) * 2013-09-12 2016-09-14 电小虎能源科技(北京)有限公司 一种应用国密算法的工业控制身份认证方法及装置
US9735967B2 (en) * 2014-04-30 2017-08-15 International Business Machines Corporation Self-validating request message structure and operation
CN104819097A (zh) * 2015-04-03 2015-08-05 北京天诚同创电气有限公司 风力发电机组的可编程控制器程序的保护方法及装置
US9407624B1 (en) 2015-05-14 2016-08-02 Delphian Systems, LLC User-selectable security modes for interconnected devices
EP3252550B1 (de) * 2016-06-01 2020-02-19 Siemens Aktiengesellschaft Modulare sicherheits-steuerungseinrichtung mit kryptografischer funktionalität
EP3479180B1 (de) * 2016-07-04 2023-08-09 SEW-Eurodrive GmbH & Co System von automatisierungskomponenten und verfahren zum betreiben
DE102016223695A1 (de) * 2016-11-29 2018-05-30 Continental Teves Ag & Co. Ohg Verfahren zur Bereitstellung von Zufallszahlen für Steuereinheiten eines Fahrzeugnetzwerks sowie Fahrzeugnetzwerk zur Durchführung dieses Verfahrens
EP3439228B1 (de) 2017-08-02 2020-07-29 Siemens Aktiengesellschaft Verfahren und vorrichtungen zum erreichen einer sicherheitsfunktion, insbesondere im umfeld einer geräte- und/oder anlagensteuerung
EP3439229A1 (de) 2017-08-02 2019-02-06 Siemens Aktiengesellschaft Verfahren und vorrichtungen zum erreichen einer sicherheitsfunktion, insbesondere im umfeld einer geräte- und/oder anlagensteuerung
EP3451573A1 (de) * 2017-08-30 2019-03-06 Siemens Aktiengesellschaft Verfahren und system zum prüfen einer funktion einer verschlüsselungseinrichtung
EP3525390A1 (de) * 2018-02-13 2019-08-14 Siemens Aktiengesellschaft Einrichtung und verfahren zum bereitstellen mindestens eines sicheren kryptographischen schlüssels für den durch ein steuergerät initiierten kryptographischen schutz von daten
DE102018108309A1 (de) * 2018-04-09 2019-10-10 Wago Verwaltungsgesellschaft Mbh Automatisierungssystem, Reihenklemme für Automatisierungssysteme sowie Verfahren hierzu
WO2020117735A1 (en) * 2018-12-03 2020-06-11 Visa International Service Association Data protection system including cryptographic key retrieval
DE102019003904A1 (de) * 2019-06-03 2020-12-03 Daimler Ag System zur Erzeugung von kryptografischem Material
DE102021205118A1 (de) 2021-05-20 2022-11-24 Continental Automotive Technologies GmbH Computerimplementiertes Verfahren und Rechnervorrichtung zur Erzeugung zumindest eines kryptographischen Schlüssels
US20230153447A1 (en) * 2021-11-17 2023-05-18 Microsoft Technology Licensing, Llc Automatic generation of security labels to apply encryption

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9719726D0 (en) * 1997-09-16 1998-03-18 Simoco Int Ltd Encryption method and apparatus
US6965992B1 (en) * 2000-02-24 2005-11-15 3Com Corporation Method and system for network security capable of doing stronger encryption with authorized devices
DE10110049A1 (de) * 2001-03-02 2002-09-05 Bosch Gmbh Robert Verfahren und Vorrichtung zur Datenverschlüsselung bei der Programmierung von Steuergeräten
US7873166B2 (en) * 2005-09-13 2011-01-18 Avaya Inc. Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
EP1793294A1 (en) * 2005-12-01 2007-06-06 Abb Research Ltd. Controller for industrial manufacturing apparatus
DE112006004090A5 (de) * 2006-08-23 2009-07-30 Siemens Aktiengesellschaft Verfahren zur Authentifizierung in einem Automatisierungssystem
WO2008096792A1 (ja) * 2007-02-07 2008-08-14 Tokyo Electron Limited サーバ装置、情報処理方法、及びプログラム
JP2010528382A (ja) * 2007-05-30 2010-08-19 ペィエエムスィイー・ネットワークス・デンマーク・エペイエス セキュアなログインプロトコル
WO2009100733A1 (de) * 2008-02-11 2009-08-20 Siemens Aktiengesellschaft Sichere übermittlung von daten an ein feldgerät
JP2009245227A (ja) * 2008-03-31 2009-10-22 Fujitsu Ltd 情報記憶装置
DE102010011657A1 (de) 2010-03-17 2011-09-22 Siemens Aktiengesellschaft Verfahren und Vorrichtung zum Bereitstellen mindestens eines sicheren kryptographischen Schlüssels

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2011113651A1 *

Also Published As

Publication number Publication date
DE102010011657A1 (de) 2011-09-22
CN102792629A (zh) 2012-11-21
WO2011113651A1 (de) 2011-09-22
US20130010965A1 (en) 2013-01-10
KR20130045260A (ko) 2013-05-03
US8989386B2 (en) 2015-03-24

Similar Documents

Publication Publication Date Title
EP2520043A1 (de) Verfahren und vorrichtung zum bereitstellen mindestens eines sicheren kryptographischen schlüssels
EP3583744B1 (de) Verfahren zum betreiben eines automatisierungsnetzwerks, automatisierungsnetzwerk und computerprogrammprodukt
EP3129888B2 (de) Übermittlung von daten aus einem gesicherten speicher
DE102011081804B4 (de) Verfahren und System zum Bereitstellen von gerätespezifischen Betreiberdaten, welche an ein Authentisierungs-Credential gebunden werden, für ein Automatisierungsgerät einer Automatisierungsanlage
EP3582033B1 (de) Verfahren zur gesicherten bedienung eines feldgeräts
WO2007036178A1 (de) Verfahren zum ausführen einer geschützten funktion eines elektrischen feldgerätes und elektrisches feldgerät
EP1774713A1 (de) Verfahren und vorrichtung zur fernkonfiguration einer zugangseinheit
EP3312692B1 (de) Bediengerät und verfahren zur bedienung eines messgeräts
EP2304558B1 (de) System und verfahren zur fernkommunikation zwischen einem zentralen computer und einer maschinensteuerung
EP3647887A1 (de) Verfahren und vorrichtung zur weitergabe einer zugriffsinformation für einen zugriff auf ein feldgerät der prozessindustrie
EP3348032A1 (de) Verfahren zum betreiben eines industrienetzwerks und industrienetzwerk
EP3525390A1 (de) Einrichtung und verfahren zum bereitstellen mindestens eines sicheren kryptographischen schlüssels für den durch ein steuergerät initiierten kryptographischen schutz von daten
WO2005104055A2 (de) Verfahren und system zur fernüberwachung, fernsteuerung und/oder ferndiagnose eines gerätes
DE102019131833A1 (de) Verfahren zur Überprüfung der Einstellung von vorgegebenen Sicherheitsfunktionen eines Feldgeräts der Prozess- und Automatisierungstechnik
EP1496664A2 (de) Vorrichtung und Verfahren sowie Sicherheitsmodul zur Sicherung eines Datenzugriffs eines Kommunikationsteilnehmers auf mindestens eine Automatisierungskomponente eines Automatisierungssystems
EP3355141B1 (de) Operator-system für ein prozessleitsystem
DE102011081803A1 (de) Verfahren und System zum Bereitstellen von gerätespezifischen Eigenschaftsdaten für ein Automatisierungsgerät einer Automatisierungsanlage
DE102010032798A1 (de) Verfahren zur Einrichtung einer speicherprogrammierbaren Steuerung
DE102020124837A1 (de) Whitelisting für hart-kommunikationen in einem prozesssteuerungssystem
DE102017216677A1 (de) Verfahren und Anordnung zum Bereitstellen eines Zugriffs auf mindestens ein Feldgerät einer technischen Anlage
EP3306856B1 (de) Verfahren zum bereitstellen einer gesicherten kommunikationsverbindung zwischen komponenten einer sicherheitskritischen funktionskette
EP3306507B1 (de) Komponente für eine sicherheitskritische funktionskette
WO2009100733A1 (de) Sichere übermittlung von daten an ein feldgerät
EP4216489A1 (de) Verfahren zur änderung eines ist-zugangsschlüssels in einem feldgerät der automatisierungstechnik
DE102014008654A1 (de) Temporäre Berechtigung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120730

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIEMENS AKTIENGESELLSCHAFT

DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20160901