GB/T 17903.2-1999
Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques (English Version)

Standard No.
GB/T 17903.2-1999
Language
Chinese, Available in English version
Release Date
1999
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Status
 2008-11
Replace By
GB/T 17903.2-2008
Latest
GB/T 17903.2-2021
Scope
Non-repudiation service aims to generate, collect, maintain, make available and confirm evidence of declared events or actions, so as to resolve disputes about the occurrence or non-occurrence of certain events or actions. This standard describes the general structure that can be used for non-repudiation services, as well as specific communication mechanism. Other non-repudiation services can be composed using the general structure described in clause 8 to meet the requirements of the security policy. This International Standard uses trusted third parties to prevent repudiation. An online trusted third party is generally required. The non-repudiation mechanism provides a protocol for exchanging non-repudiation tokens specific to each non-repudiation service. A non-repudiation token consists of a secure envelope and additional data. Non-repudiation tokens should be stored as non-repudiation information and used in future disputes. According to the non-repudiation strategy used in a particular application and the legal environment in which the application is located, the non-repudiation information may include the following additional information: a) Including evidence of a credible time stamp generated by the time stamping authority; b) The notary provides evidence that provides assurance about actions or events performed by one or more entities. The term non-repudiation can only be effective in a security policy clearly defined by a specific application and its legal environment.

GB/T 17903.2-1999 history

  • 2021 GB/T 17903.2-2021 Information technology—Security techniques—Non-repudiation—Part 2: Mechanisms using symmetric techniques
  • 2008 GB/T 17903.2-2008 Information technology. Security techniques. Non-repudiation. Part 2: Mechanisms using symmetric techniques
  • 1999 GB/T 17903.2-1999 Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques
Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques

GB/T 17903.2-1999 -All Parts




Copyright ©2024 All Rights Reserved