ISO IEC TR 29149-2012 Information technology - Security techniques - Best practices for the provision and use of time-stamping services《信息技术 安全技术 时间标记业务供应和使用的最佳.pdf
《ISO IEC TR 29149-2012 Information technology - Security techniques - Best practices for the provision and use of time-stamping services《信息技术 安全技术 时间标记业务供应和使用的最佳.pdf》由会员分享,可在线阅读,更多相关《ISO IEC TR 29149-2012 Information technology - Security techniques - Best practices for the provision and use of time-stamping services《信息技术 安全技术 时间标记业务供应和使用的最佳.pdf(28页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC TR 29149:2012(E) ISO/IEC 2012TECHNICAL REPORT ISO/IEC TR 29149 First edition 2012-03-15Information technology Security techniques Best practices for the provision and use of time-stamping services Technologies de linformation Techniques de scurit Meilleures pratiques pour l
2、a fourniture et lutilisation de services dhorodotage ISO/IEC TR 29149:2012(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2012 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocop
3、ying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzer
4、land ii ISO/IEC 2012 All rights reservedISO/IEC TR 29149:2012(E) ISO/IEC 2012 All rights reserved iiiContents Page Foreword iv Introduction . v 1 Scope 1 2 Terms and definitions . 1 3 Symbols and abbreviated terms 4 4 Time-stamping services 5 5 Use cases for non-repudiation . 5 5.1 Introduction 5 5.
5、2 Use case #1 6 5.3 Use case #2 6 5.4 Use case #3 6 6 Potential issues . 7 6.1 Security requirements for custody of evidences . 7 6.2 Weak cryptography: hash-functions . 8 6.3 Weak cryptography: digital signatures . 10 6.4 Weak cryptography: message authentication codes 10 6.5 Signature verification
6、 10 6.6 Time-stamp token renewal . 11 6.7 Time-stamping service availability 12 6.8 Time-stamping service continuity . 12 7 Recommendations 12 7.1 Recommendations for requesters of time-stamp tokens 12 7.2 Recommendations for verifiers of time-stamp tokens 13 7.3 Recommendations for time-stamp servi
7、ce providers . 13 7.4 Recommendations for signature verification . 16 7.5 Non-repudiation policy . 17 8 Algorithms 17 8.1 Overview . 17 8.2 Hash functions . 17 8.3 Keyed message authentication algorithms 18 8.4 Signature algorithms . 18 Bibliography 19 ISO/IEC TR 29149:2012(E) iv ISO/IEC 2012 All ri
8、ghts reservedForeword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards t
9、hrough technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, a
10、lso take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to p
11、repare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. In exceptional circumstances, when t
12、he joint technical committee has collected data of a different kind from that which is normally published as an International Standard (“state of the art”, for example), it may decide to publish a Technical Report. A Technical Report is entirely informative in nature and shall be subject to review e
13、very five years in the same manner as an International Standard. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC TR 29149 was prepare
14、d by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. ISO/IEC TR 29149:2012(E) ISO/IEC 2012 All rights reserved vIntroduction This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effecti
15、ve when used to provide timeliness and data integrity services, or non-repudiation services (in conjunction with other mechanisms). ISO/IEC 18014 specifies time-stamping services, explaining how to generate, renew, and verify time-stamp tokens. The goal of a non-repudiation service is to treat evide
16、nce concerning a claimed event or action in order to resolve disputes about the occurrence or non-occurrence of the event or action. Depending on the non-repudiation service which is required, the non-repudiation policy in effect for a specific application, and the legal environment within which the
17、 application operates, time-stamp tokens from time-stamping authorities may be required as components of non-repudiation information. TECHNICAL REPORT ISO/IEC TR 29149:2012(E) ISO/IEC 2012 All rights reserved 1Information technology Security techniques Best practices for the provision and use of tim
18、e-stamping services 1 Scope This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines: how time-stamp requesters s
19、hould use time-stamp token generation services; how TSAs (time-stamping authorities) should provide a service of guaranteed quality; how TSAs should deserve trust based on good practices; which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TST
20、s resist during the time period during which the TSTs can be verified as being valid; how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs. 2 Terms and definitions For the purposes of this
21、document, the following terms and definitions apply. 2.1 certification authority CA authority trusted by one or more users to create and assign public-key certificates NOTE Optionally, the certification authority may create the users keys. ISO/IEC 9594-8:2005 2.2 digital signature data appended to,
22、or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient ISO 7498-2:1989 2.3 evidence information which is used, either by itself or in conjunction with other infor
23、mation, to establish proof about an event or action NOTE Evidence does not necessarily prove the truth or existence of something, but can contribute to the establishment of such a proof. ISO/IEC 13888-1:2009 ISO/IEC TR 29149:2012(E) 2 ISO/IEC 2012 All rights reserved2.4 evidence user entity that use
24、s non-repudiation evidence ISO/IEC 13888-1:2009 2.5 hash-function function which maps strings of bits to fixed-length strings of bits, satisfying the following two properties: It is computationally infeasible to find for a given output, an input which maps to this output. It is computationally infea
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIECTR291492012INFORMATIONTECHNOLOGYSECURITYTECHNIQUESBESTPRACTICESFORTHEPROVISIONANDUSEOFTIMESTAMPINGSERVICES

链接地址:http://www.mydoc123.com/p-1257434.html