Preview

Non-Repudiation

Good Essays
Open Document
Open Document
669 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Non-Repudiation
Non-repudiation
It refers to one of the properties of cryptographic digital signatures that offer the possibility of proving whether a particular message has been digitally signed by the holder of a particular digital signature’s private key. A digital signature owner, who may like to deny a transaction maliciously, may always claim that his or her digital signature key was stolen by someone and that someone actually signed the digital transaction in question, thus not accepting/denying the transaction.
An exchange of information between two entities implies an element of trust. This "implied element of trust" may not be enough and may require the use of a Trusted Third Party (TTP) to facilitate the trusted exchange of information.

The role of TTPs includes providing assurance that business and other trustworthy messages and transactions are being transferred to the intended recipient, at the correct location, that messages are received in a timely and accurate manner, and that for any business dispute that may arise, there exist appropriate methods for the creation and delivery of the required evidence for proof of what happened. There are some guidelines which impact on the use and management of trusted third party services according to ISO 14516:2002;
1) Approval: proof of who is responsible for approval of the contents of a message.
2) Sending: proof of who sent the message.
3) Origin: combination of approval and sending the message.
4) Submission: proof that a delivery agent has accepted the message for transmission.
5) Transport: proof for the message originator that a delivery agent has delivered the message to the intended recipient.
6) Receipt: proof that the recipient received the message.
7) Knowledge: proof that the recipient recognized the content of the received message.
8) Delivery: proof that the recipient received and recognized the content of the message.
Non-repudiation can also be looked at from two aspects; the legal aspect and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    External Mail Services

    • 536 Words
    • 3 Pages

    2.1- Explain the purpose of distributing and dispatching mail to correct recipient within the agreed timescale.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The transport protocols has to offer a reliable deliver to make sure the flow of data is going through the network. This is a great feature because it allow the device to communicate to freely to other network. This allow mismatches in speed between the send and the receiver host and it can be dealt with right away.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    TRUSTED: All devices required for daily work in the company, that should not be accessible by the public, should be placed into the TRUSTED zone. However, the TRUSTED zone can be further divided into separate zones by physical or logical means to provide additional security and access control. This subdivision helps manage and enforce least privilege access to network resources.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bennis V. Michigan

    • 1054 Words
    • 5 Pages

    1. Falsely making or altering any signature to, or any part of any written purporting to have efficacy.…

    • 1054 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    I will run this by all the travelers that is sharing the cost of the fuel.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sample 1

    • 456 Words
    • 2 Pages

    The physical protection of Finman’s data will need to be protected by proper configuration and setup of data network infrastructure. Both thirds parties will need to ensure ACL systems are set and configured to ensure access and data flow is running properly. There is to be granted access to only privilege user’s assigned and agreed upon. Authentication and authorization is to be set in place to ensure protection with Finman’s data resources along with network resources. Authentication and authorization can be applied by enforcing Group Polices. Each third party will need to have proper verification set in place otherwise known as Third Party Verification (TPV). TPV will provide both parties to meet industry standards such as Federal Communication Commission and Federal Trade Commission. Backup solutions for data storage will need to be set in place to ensure integrity of Finman’s data and meets industry standards.…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Paper

    • 1317 Words
    • 6 Pages

    | contracts are often incomplete and leave room for implicit understandings between the two parties.…

    • 1317 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Business & Admin Level 2

    • 2181 Words
    • 9 Pages

    It has arrived to the correct address and to be passed on to the correct person. The purpose of correctly checking and sorting…

    • 2181 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    First of all, which cryptographic technique can be used to verify the identity of a message's sender?…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SBAR In Nursing

    • 358 Words
    • 2 Pages

    It is evident that most individuals build trust when information is passed to them on a one on one basis other that through other means of communication (Prasad & George, 2014).…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Genuineness Of Assent

    • 1132 Words
    • 6 Pages

    8. Create a PowerPoint in Google Drive Presentation using the “Key Terms” as well as the sub headings for each section in 7-1 Duress and Undue Influence, pages 127 to 129.…

    • 1132 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    3. The third step is the when the receiver has to interpret/decode the sender 's message.…

    • 1467 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    The final stage is when the message has being understood and the other person can understand the meaning of the message (Moonie, N, 2010)…

    • 1356 Words
    • 6 Pages
    Better Essays
  • Good Essays

    1) The sender. Must provide clear, understandable instruction or information on the subject so the receiver has no doubt of what is required of them.…

    • 1331 Words
    • 6 Pages
    Good Essays