Non-repudiation

In law, non-repudiation is a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract.[1] The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated".[2]

For example, Mallory buys a cell phone for $100, writes a paper cheque as payment, and signs the cheque with a pen. Later, she finds that she can't afford it, and claims that the cheque is a forgery. The signature guarantees that only Mallory could have signed the cheque, and so Mallory's bank must pay the cheque. This is non-repudiation; Mallory cannot repudiate the cheque. In practice, pen-and-paper signatures are not hard to forge, but digital signatures can be very hard to break.

In security

In general, non-repudiation involves associating actions or changes with a unique individual. For example, a secure area may use a key card access system where non-repudiation would be violated if key cards were shared or if lost and stolen cards were not immediately reported. Similarly, the owner of a computer account must not allow others to use it, such as by giving away their password, and a policy should be implemented to enforce this.[3]

In digital security

In digital security, non-repudiation means:[4]

  • A service that provides proof of the integrity and origin of data.
  • An authentication that can be said to be genuine with high confidence.
  • An authentication that the data is available under specific circumstances, or for a period of time: data availability.[5]

Proof of data integrity is typically the easiest of these requirements to accomplish. A data hash such as SHA2 usually ensures that the data will not be changed undetectably. Even with this safeguard, it is possible to tamper with data in transit, either through a man-in-the-middle attack or phishing. Because of this, data integrity is best assessed when the recipient already possesses the necessary verification information, such as after being mutually authenticated.[6]

The common method to provide non-repudiation in the context of digital communications or storage is Digital Signatures, a more powerful tool that provides non-repudiation in a publicly verifiable manner.[7] Message Authentication Codes (MAC), useful when the communicating parties have arranged to use a shared secret that they both possess, does not give non-repudiation. A misconception is that encrypting, per se, provides authentication "If the message decrypts properly then it is authentic", which is not the case. MAC can be subject to several types of attacks, like: message reordering, block substitution, block repetition, .... Thus just providing message integrity and authentication, but not non-repudiation. To achieve non-repudiation one must trust a service (a certificate generated by a trusted third party (TTP) called certificate authority (CA)) which prevents an entity from denying previous commitments or actions (e.g. sending message A to B). The difference between MAC and Digital Signatures, one uses symmetric keys and the other asymmetric keys (provided by the CA). Note that the goal is not to achieve confidentiality: in both cases (MAC or digital signature), one simply appends a tag to the otherwise plaintext, visible message. If confidentiality is also required, then an encryption scheme can be combined with the digital signature, or some form of authenticated encryption could be used. Verifying the digital origin means that the certified/signed data likely came from someone who possesses the private key corresponding to the signing certificate. If the key used to digitally sign a message is not properly safeguarded by the original owner, digital forgery can occur.[8][9][10]

Trusted third parties (TTPs)

To mitigate the risk of people repudiating their own signatures, the standard approach is to involve a trusted third party.[11]

The two most common TTPs are forensic analysts and notaries. A forensic analyst specializing in handwriting can compare some signature to a known valid signature and assess its legitimacy. A notary is a witness who verifies an individual's identity by checking other credentials and affixing their certification that the person signing is who they claim to be. A notary provides the extra benefit of maintaining independent logs of their transactions, complete with the types of credentials checked, and another signature that can be verified by the forensic analyst. [citation needed]

For digital information, the most commonly employed TTP is a certificate authority, which issues public key certificates. A public key certificate can be used by anyone to verify digital signatures without a shared secret between the signer and the verifier. The role of the certificate authority is to authoritatively state to whom the certificate belongs, meaning that this person or entity possesses the corresponding private key. However, a digital signature is forensically identical in both legitimate and forged uses. Someone who possesses the private key can create a valid digital signature. Protecting the private key is the idea behind some smart cards such as the United States Department of Defense's Common Access Card (CAC), which never lets the key leave the card. That means that to use the card for encryption and digital signatures, a person needs the personal identification number (PIN) code necessary to unlock it.[citation needed]

See also

References

  1. ^ Li, Zhaozheng; Lei, Weimin; Hu, Hanyun; Zhang, Wei (2019). "A Blockchain-based Communication Non-repudiation System for Conversational Service". 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID). pp. 6–10. doi:10.1109/ICASID.2019.8924991. ISBN 978-1-7281-2458-2. S2CID 209320279.
  2. ^ Rosendorff (25 January 2023). "What is Repudiation of a Contract? - Rosendorff Lawyers".
  3. ^ Christopher Negus (2012). Linux Bible. Wiley. p. 580. ISBN 978-1-118-28690-6.
  4. ^ Non-Repudiation in the Digital Environment (Adrian McCullagh)
  5. ^ Yu, Mingchao; Sahraei, Saeid; Nixon, Mark; Han, Song (18 July 2020). "SoK: Sharding on Blockchain". Proceedings of the 1st ACM Conference on Advances in Financial Technologies. pp. 114–134. doi:10.1145/3318041.3355457. ISBN 9781450367325. S2CID 204749727.
  6. ^ Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (July 2020). "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing". Wireless Personal Communications. 113 (1): 575–598. doi:10.1007/s11277-020-07240-2. S2CID 218934756.
  7. ^ Chia, Jason; Chin, Ji-Jian; Yip, Sook-Chin (2021-09-16). "Digital signature schemes with strong existential unforgeability". F1000Research. 10: 931. doi:10.12688/f1000research.72910.1. PMC 9925878. PMID 36798451.
  8. ^ Wu, Wei; Zhou, Jianying; Xiang, Yang; Xu, Li (December 2013). "How to achieve non-repudiation of origin with privacy protection in cloud computing". Journal of Computer and System Sciences. 79 (8): 1200–1213. doi:10.1016/j.jcss.2013.03.001.
  9. ^ "What are the differences between a digital signature, a MAC and a hash?".
  10. ^ Sosin, Artur (2018). "How to increase the information assurance in the information age". Journal of Defense Resources Management. 9 (1): 45–57. ProQuest 2178518357.
  11. ^ Zhou, Jianying; Gollmann, Dieter (1996). "Observations on non-repudiation". In Kim, Kwangjo; Matsumoto, Tsutomu (eds.). Advances in Cryptology — ASIACRYPT '96. Lecture Notes in Computer Science. Vol. 1163. Berlin, Heidelberg: Springer. pp. 133–144. doi:10.1007/BFb0034842. ISBN 978-3-540-70707-3.

Read other articles:

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (ديسمبر 2020) أليثا سولتر   معلومات شخصية الميلاد سنة 1945 (العمر 77–78 سنة)  مواطنة الولايات المتحدة  الحياة العملية المهنة عالمة نفس،  وكاتِبة  اللغات الإنجلي

 

Pour les articles homonymes, voir Choc. Dans une partie de billard, les collisions sont pratiquement élastiques. Collisions élastiques dans un gaz. Un choc élastique est un choc entre deux corps qui n’entraîne pas de modification de leur état interne[1], notamment de leur masse. Dans un tel choc, l'énergie cinétique est conservée. La diffusion des corps, ponctuels ou non, à la suite d'un choc élastique dépend de la loi d'interaction qui intervient au moment du choc et de leur pos...

 

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (نوفمبر 2019) جون جاي إميري معلومات شخصية الميلاد 28 يناير 1898  نيويورك  تاريخ الوفاة 24 سبتمبر 1976 (78 سنة)   مواطنة الولايات المتحدة  إخوة وأخوات أودري إميري  الح...

?Hipposideros dyacorum Охоронний статус Найменший ризик (МСОП 3.1) Біологічна класифікація Домен: Еукаріоти (Eukaryota) Царство: Тварини (Animalia) Тип: Хордові (Chordata) Клас: Ссавці (Mammalia) Ряд: Рукокрилі (Chiroptera) Підряд: Кажани (Microchiroptera) Родина: Hipposideridae Рід: Hipposideros Біноміальна назва Hipposideros dyacorum(Th...

 

2015 single by DJ Khaled featuring Chris Brown, Lil Wayne and Big SeanHow Many TimesSingle by DJ Khaled featuring Chris Brown, Lil Wayne and Big Seanfrom the album I Changed a Lot ReleasedMay 12, 2015 (2015-05-12)Recorded2015GenreHip hopelectro-R&BLength4:23LabelWe the BestREDSonySongwriter(s)Khaled KhaledBrandon KornChristopher BrownDwayne CarterSean AndersonAnthony NorrisOzan YildirimProducer(s)DJ KhaledBkornLee on the BeatsOZDJ Khaled singles chronology Don't Shoot (...

 

2014 video gameTransistorDeveloper(s)Supergiant GamesPublisher(s)Supergiant GamesDesigner(s)Amir RaoGreg KasavinProgrammer(s)Christopher JurneyGavin SimonAndrew WangArtist(s)Jen ZeeWriter(s)Greg KasavinComposer(s)Darren KorbPlatform(s)Microsoft Windows, PlayStation 4, OS X, Linux, iOS, Nintendo SwitchReleasePlayStation 4WW: May 20, 2014Microsoft WindowsWW: May 21, 2014OS XWW: October 30, 2014LinuxWW: October 30, 2014iOSWW: June 11, 2015tvOSWW: November 2, 2015Nintendo SwitchWW: November 1, 20...

Painting by Gilbert Stuart Lansdowne portraitArtistGilbert StuartYear1796MediumOil on canvasDimensions247.6 cm × 158.7 cm (97.5 in × 62.5 in)LocationNational Portrait Gallery, Washington, D.C. The Lansdowne portrait is an iconic life-size portrait of George Washington painted by Gilbert Stuart in 1796. It depicts the 64-year-old president of the United States during his final year in office. The portrait was a gift to former British Prime Minister W...

 

Segundo Plan Quinquenal en Argentina Parte de Segundo gobierno de Perón El Segundo Plan Quinquenal se basó en impulsar el crecimiento de la industria pesada.LocalizaciónPaís  ArgentinaDatos generalesTipo Plan QuinquenalOrganizador Juan Domingo PerónHistóricoFecha de inicio 1953Fecha de fin 1955Cronología Plan Quinquenal en Argentina ◄ Actual ► [editar datos en Wikidata] El Segundo Plan Quinquenal de 1953 se llevó a cabo en el segundo mandato del general Juan Domingo...

 

Polish politician Wojciech Michał OlejniczakMember of the SejmIn office19 October 2001 – 10 June 2009Constituency9 – ŁódźMinister of Agriculture and Rural Development of the Republic of PolandIn office2 July 2003 – 31 May 2005Preceded byAdam TańskiSucceeded byJerzy PilarczykLeader of Democratic Left AllianceIn office29 May 2005 – 31 May 2008Preceded byJózef OleksySucceeded byGrzegorz Napieralski Personal detailsBorn (1974-04-10) 10 April 1974 (age ...

Le Suffrage universel, lithographie dédiée à Ledru-Rollin, par Frédéric Sorrieu (1850) Cet article liste les émissions de franc français sous la Deuxième République entre 1848 et 1852. Pièces Types de circulation courante Type Dupré 1 centime Dupré Avers et revers Avers : Marianne regardant vers la gauche. La mention « République Française » sur le pourtour. Revers : La valeur faciale en lettres : « UN CENTIME » et l'année d'émission. Mas...

 

ジョン・プロヒューモ ジョン・デニス・ジャック・プロヒューモ CBE(John Dennis Jack Profumo CBE, 1915年1月30日 - 2006年3月9日)は、イギリスの政治家。ハロルド・マクミランの保守党政権に大打撃を与えた、1963年のプロヒューモ事件での中心人物であった。 プロフィール 生い立ち プロヒューモはロンドンのケンジントン地区で、イタリアが起源の家系に生まれる。父親のア...

 

Musical GigiOriginal Broadway PosterMusicFrederick LoeweLyricsAlan Jay LernerBookAlan Jay LernerBasisNovel by ColettePremiereMay 15, 1973: Curran Theatre, San FranciscoProductions1973 Broadway 1985 West End 2015 Kennedy Center 2015 Broadway RevivalAwardsTony Award for Best Score Gigi is a musical with a book and lyrics by Alan Jay Lerner and music by Frederick Loewe. It is based on the 1944 novella Gigi by Colette and 1958 hit musical film of the same name. The story concerns Gigi, a free-spi...

Second capital of Goguryeo Guonei CityUNESCO World Heritage SiteLocationJi'an, Jilin, ChinaPart ofCapital Cities and Tombs of the Ancient Koguryo KingdomCriteriaCultural: (i)(ii)(iii)(iv)(v)Reference1135-002Inscription2004 (28th Session)Area59.24 ha (146.4 acres)Coordinates41°8′19.4″N 126°10′34.3″E / 41.138722°N 126.176194°E / 41.138722; 126.176194Chinese nameTraditional Chinese國內城Simplified Chinese国内城TranscriptionsStandard Mandar...

 

The Aztec day sign Itzcuintli (dog) from the Codex Laud. Dogs have occupied a powerful place in Mesoamerican folklore and myth since at least the Classic Period right through to modern times.[1] A common belief across the Mesoamerican region is that a dog carries the newly deceased across a body of water in the afterlife. Dogs appear in underworld scenes painted on Maya pottery dating to the Classic Period and even earlier than this, in the Preclassic, the people of Chupícuaro buried...

 

This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Hostile Waters film – news · newspapers · books · scholar · JSTOR (May 2018) (Learn how and when to remove this template message) Cover of 1998 BBC VHS release of the film Hostile Waters is a British 1997 television film about the loss of the Soviet Navy's K-219, a Yankee I...

Supreme law of Bangladesh Constitution of BangladeshFirst page of the original Constitution of Bangladesh in BanglaOverviewJurisdiction BangladeshRatified4 November 1972; 51 years ago (1972-11-04)Date effective16 December 1972; 50 years ago (1972-12-16)SystemUnitary Parliamentary Constitutional RepublicGovernment structureBranchesThree (Executive, Legislature and Judiciary)ChambersOneExecutivePrime Minister and cabinet responsible to the Jatiya Sa...

 

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Robot Chicken: Star Wars Episode II – news · newspapers · books · scholar · JSTOR (May 2010) (Learn how and when to remove this template message) American TV series or program Robot Chicken: Star Wars Episode IIDVD coverCreated by Seth Green Matthew Senrei...

 

Body encompassing professional philosophers in USA For the general learned society, see American Philosophical Society. Not to be confused with the American Psychiatric Association or the American Psychological Association. American Philosophical AssociationEstablished1900LocationNewark, DelawarePresidentChristia Mercer (Eastern)Julia Driver (Central)Penelope Maddy (Pacific)First PresidentMary Whiton CalkinsAffiliationsAmerican Council of Learned Societies, National Humanities AllianceWebsite...

This article may rely excessively on sources too closely associated with the subject, potentially preventing the article from being verifiable and neutral. Please help improve it by replacing them with more appropriate citations to reliable, independent, third-party sources. (August 2020) (Learn how and when to remove this template message) Part of a series onSex and sexuality inspeculative fiction Main topics Sex and sexuality Gender Women Reproduction Genres Women in comics Feminist science...

 

2008年夏季奧林匹克運動會摔跤比賽 自由式 男子 女子   55公斤級     48公斤級     60公斤級     55公斤級     66公斤級     63公斤級     74公斤級     72公斤級     84公斤級         96公斤級       120公斤級 古典式 男子   55公斤級     84公斤級     60公斤級     96公斤級   ...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!