GB/T 17903.3-2024 English PDFUS$299.00 ยท In stock
Delivery: <= 3 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 17903.3-2024: Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques Status: Valid GB/T 17903.3: Historical versions
Basic dataStandard ID: GB/T 17903.3-2024 (GB/T17903.3-2024)Description (Translated English): Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.030 Word Count Estimation: 14,141 Date of Issue: 2024-03-15 Date of Implementation: 2024-10-01 Older Standard (superseded by this standard): GB/T 17903.3-2008 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 17903.3-2024: Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. ICS 35.030 CCSL80 National Standards of People's Republic of China Replaces GB/T 17903.3-2008 Information technology security technology non-repudiation Part 3.Mechanisms using asymmetric techniques (ISO /IEC 13888-3.2020, Information security-Non-repudiation- Released on 2024-03-15 2024-10-01 Implementation State Administration for Market Regulation The National Standardization Administration issued Table of ContentsPreface I Introduction II 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Symbols 1 5 Requirement 2 6 Involvement of trusted third parties 2 7 Digital Signature 3 8 Non-repudiation Token 3 9 Mechanisms for generating evidence by end entities 4 9.1 General Rules 4 9.2 Non-repudiation of origin mechanism 4 9.3 Delivery Non-Repudiation Mechanism 5 10 Mechanisms for generating evidence by delivery agencies 6 10.1 General Rules 6 10.2 Submission Non-Repudiation Mechanism 6 10.3 Transmission Non-Repudiation Mechanism 7 11 Time Guarantee Mechanism 8 11.1 General Rules 8 11.2 Timestamp mechanism 9 11.3 Mechanisms for using time notarization services 9 Reference 10ForewordThis document is in accordance with the provisions of GB/T 1.1-2020 "Guidelines for standardization work Part 1.Structure and drafting rules for standardization documents" Drafting. This document is Part 3 of GB/T 17903 "Information Technology Security Technology Non-Repudiation". GB/T 17903 has been published in the following parts. --- Part 1.Overview; --- Part 2.Mechanisms using symmetric techniques; --- Part 3.Mechanisms using asymmetric techniques. This document replaces GB/T 17903.3-2008 "Information technology security technology non-repudiation part 3.using asymmetric technology Compared with GB/T 17903.3-2008, in addition to structural adjustments and editorial changes, the main technical changes are as follows. a) Added security requirements for digital signatures (see Chapter 5); b) Added a time guarantee mechanism (see Chapter 11). This document is modified to adopt ISO /IEC 13888-3.2020 "Information security non-repudiation part 3.Mechanisms using asymmetric techniques". The technical differences between this document and ISO /IEC 13888-3.2020 and their reasons are as follows. a) Added normative reference GB/T 20520 (see Chapter 3), citing the terms of this standard; b) Deleted the definition of "3.2 Timestamp service" in Chapter 3 of ISO /IEC 13888-3.2020.This term has been included in the normative references. The definition is given in GB/T 20520; c) The normative reference GB/T 17903.1 replaces ISO /IEC 13888-1 (see Chapter 3 and Chapter 4) to adapt to my country's Technical conditions; d) The requirements for collision-resistant hash functions have been modified to adapt to my country's technical conditions (see Chapter 5); e) The normative references GB/T 15851 (all parts) replaced ISO /IEC 9796 (all parts), and the normative references GB/T 15851 (all parts) replaced ISO /IEC 9796 (all parts). GB/T 17902 (all parts) replaced ISO /IEC 14888 (all parts) (see Chapter 7) to adapt to my country's technical requirements. Technical conditions; f) ISO /IEC 18014 (all parts) (see 11.2) has been replaced by the normative reference GB/T 20520 to adapt to the technical requirements of my country. Technical conditions. The following editorial changes were made to this document. a) To coordinate with the existing standards, the name of the standard is changed to "Information Technology Security Technology Non-Repudiation Part 3. Mechanisms using asymmetric techniques"; b) deleted the informative references to ISO /IEC 10118 (all parts) in ISO /IEC 13888-3.2020; c) ISO /IEC 9594-8 is replaced by the informative reference GB/T 16264.8-2005 (see Chapter 6). Please note that some of the contents of this document may involve patents. The issuing organization of this document does not assume the responsibility for identifying patents. This document was proposed and coordinated by the National Cybersecurity Standardization Technical Committee (SAC/TC260). This document was drafted by. Institute of Software, Chinese Academy of Sciences, Changchun Jilin University Zhengyuan Information Technology Co., Ltd., Beijing Zhongguancun Laboratory Institute of Computer Science, University of Chinese Academy of Sciences, China Electronics Technology Network Security Technology Co., Ltd., China Electronics Technology Standardization Institute, Qi'anxin Technology Group Co., Ltd., National Certification Technology (Beijing) Co., Ltd., Geer Software Co., Ltd., Beijing Xin'an Century Technology Co., Ltd., Anxi Electric Jetcom Wireless Network Communications Co., Ltd. The main drafters of this document are. Zhang Yan, Zhang Liwu, Zhang Zhenfeng, Feng Dengguo, Zhang Yan, Wang Rui, Liu Limin, Yin Qilei, Zhang Liting, Lin Yanghuichen, Zhang Baoxin, Huang Liang, Wang Zongbin, Zheng Qiang, Li Jun, Li Ruxin, Du Zhiqiang, Yang Lingbo, Qian Wei, and Wang Xianfang. The previous versions of this document and the documents it replaces are as follows. ---First published in.1999 as GB/T 17903.3-1999; ---First revised in.2008; ---This is the second revision.IntroductionNon-repudiation services are designed to generate, collect, maintain, utilize, and verify evidence about claimed events or actions in order to resolve disputes regarding such events. GB/T 17903 aims to describe the model of the anti-repudiation mechanism and the use of symmetric cryptographic technology and non- The specific anti-repudiation mechanism of symmetric encryption technology is planned to consist of three parts. --- Part 1.Overview. The purpose is to give a general model of the non-repudiation mechanism as specified in other parts of GB/T 17903 A general model for non-repudiation mechanisms using cryptographic techniques. --- Part 2.Mechanisms using symmetric technology. The purpose is to provide specific non-repudiation mechanisms using symmetric cryptographic technology. --- Part 3.Mechanisms using asymmetric technology. The purpose is to provide specific non-repudiation mechanisms using asymmetric cryptographic technology. Information technology security technology non-repudiation Part 3.Mechanisms using asymmetric techniques1 ScopeThis document defines several specific non-repudiation mechanisms to provide non-repudiation of origin, non-repudiation of delivery, non-repudiation of transmission, and non-repudiation of submission. deny. This document applies to the design, implementation and testing of message non-repudiation related applications implemented using asymmetric technology.2 Normative referencesThe contents of the following documents constitute the essential clauses of this document through normative references in this document. For referenced documents without a date, only the version corresponding to that date applies to this document; for referenced documents without a date, the latest version (including all amendments) applies to This document. GB/T 15851 (all parts) Information technology security techniques Digital signature schemes with message recovery [ISO /IEC 9796 (all parts) Some)] Note 1.GB/T 15851.3-2018 Information technology security techniques Digital signature schemes with message recovery Part 3.Mechanisms based on discrete logarithms (ISO /IEC 9796-3.2006,MOD) GB/T 17902 (all parts) Information technology security techniques Digital signatures with appendix [ISO /IEC 14888 (all parts)] Note 2.GB/T 17902.1-2023 Information technology security techniques Digital signatures with appendices Part 1.Overview (ISO /IEC 14888-1. 2008, IDT) GB/T 17902.2-2023 Information technology security technology Digital signature with appendix Part 2.Identity-based mechanism (ISO / IEC 14888-2.1999, IDT) GB/T 17902.3-2023 Information technology security techniques Digital signatures with appendix Part 3.Certificate-based mechanisms (ISO / IEC 14888-3.1998, IDT) GB/T 17903.1 Information technology security technology non-repudiation Part 1.Overview (GB/T 17903.1-2024, ISO / IEC 13888-1.2020,MOD) GB/T 20520 Network security technology public key infrastructure timestamp specification ISO /IEC 29192-4 Information technology security techniques Lightweight cryptography Part 4.Mechanisms using asymmetric techniques (In-3 Terms and definitionsThe terms and definitions defined in GB/T 17903.1 and GB/T 20520 and the following terms and definitions apply to this document. 3.1 Time-marking service A service that provides evidence that a record occurred before a specific point in time. NOTE. The evidence contains a hash code and an identifier of the hash function used. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 17903.3-2024_English be delivered?Answer: Upon your order, we will start to translate GB/T 17903.3-2024_English as soon as possible, and keep you informed of the progress. The lead time is typically 1 ~ 3 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 17903.3-2024_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 17903.3-2024_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.Question 5: Should I purchase the latest version GB/T 17903.3-2024?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 17903.3-2024 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically. |