|
US$379.00 · In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 17903.2-2021: (Information technology Security technology Non-repudiation - Part 2: Mechanisms using symmetric technology) Status: Valid GB/T 17903.2: Evolution and historical versions
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 17903.2-2021 | English | 379 |
Add to Cart
|
4 days [Need to translate]
|
(Information technology Security technology Non-repudiation - Part 2: Mechanisms using symmetric technology)
| Valid |
GB/T 17903.2-2021
|
| GB/T 17903.2-2008 | English | 719 |
Add to Cart
|
3 days [Need to translate]
|
Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques
| Obsolete |
GB/T 17903.2-2008
|
| GB/T 17903.2-1999 | English | 679 |
Add to Cart
|
3 days [Need to translate]
|
Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques
| Obsolete |
GB/T 17903.2-1999
|
PDF similar to GB/T 17903.2-2021
Basic data | Standard ID | GB/T 17903.2-2021 (GB/T17903.2-2021) | | Description (Translated English) | (Information technology Security technology Non-repudiation - Part 2: Mechanisms using symmetric technology) | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Word Count Estimation | 19,152 | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration |
GB/T 17903.2-2008: Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information technology Security techniques Non-repudiation Part 2.. Mechanisms using symmetric techniques
ICS 35.040
L80
National Standards of People's Republic of China
GB/T 17903.2-2008/ISO /IEC 13888-2.1998
Replacing GB/T 17903.2-1999
Information technology - Security techniques - repudiation
Part 2. Mechanisms using symmetric techniques
(ISO /IEC 13888-2.1998, IDT)
Posted 2008-06-26
2008-11-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Preface Ⅰ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Notation and abbreviations 1
5 Requirement 2
Organization of each chapter 6 section 3
7 Safety Envelope 3
8 Non-repudiation token generation and verification 3
8.1 TTP Create token 3
Items 8.2 Non-repudiation mechanism using 3
8.3 Non-repudiation token 4
Right 8.4 TTP carried out verification mark 6
9 specific non-repudiation mechanism 6
9.1 Primary Non-repudiation mechanism 7
9.2 Non-repudiation delivery mechanism 7
9.3 Non-repudiation mechanism 8 Submit
9.4 Non-repudiation transmission mechanism 8
9.5 Get timestamp mechanism 8
10 Non-repudiation mechanism Example 9
10.1 Mechanism M1. mandatory NRO, optional NRD 9
10.2 Mechanism M2. Forced NRO, forced NRD 10
10.3 Mechanism M3. mandatory mediation with the NRO and NRD TTP 11
Appendix A (informative) References 14
GB/T 17903.2-2008/ISO /IEC 13888-2.1998
Foreword
GB/T 17903 under "Information technology - Security techniques - Non - repudiation" general title, consists of the following components.
--- Part 1. General;
--- Part 2. Mechanisms using symmetric techniques;
--- Part 3. Mechanisms using asymmetric techniques.
This part of GB/T 17903 Part 2, identical with ISO /IEC 13888-2.1998 "Information technology - Security techniques - against
Lai - Part 2. Symmetric technology mechanism ", only editorial changes. ISO /IEC 13888-2.1998 by the Joint Technical Committee
ISO /IEC JTC1 (IT) technical committee SC27 (IT security technology) raised.
This Part replaces GB/T 17903.2-1999 "Information technology - Security techniques - Non - repudiation - Part 2. Machine symmetric techniques
system". This section compared with the GB/T 17903.2-1999, the main differences are as follows.
--- This part under the revised Part 1, change some of the terms.
--- This section describes part of the text has been revised and amended Chapter 10 of "NORT".
Appendix A of this section is informative appendix.
This part of the National Security Standardization Technical Committee and centralized.
The main drafters of this section. Software, Chinese Academy of Sciences, State Key Laboratory of Information Security.
The main drafters of this section. Zhang Zhenfeng, FENG Deng.
This part of the standard replaces the previous editions are.
--- GB/T 17903.2-1999.
GB/T 17903.2-2008/ISO /IEC 13888-2.1998
Information technology - Security techniques - repudiation
Part 2. Mechanisms using symmetric techniques
1 Scope
Non-repudiation service is designed to generate, collect, maintain, use and verification of evidence has claimed about events or actions to address about the event or
Action or dispute occurred has occurred. This section describes the general structure for non-repudiation services, as well as some specific and relevant communication
The mechanism for providing primary non-repudiation (NRO), the delivery of non-repudiation (NRD), to submit non-repudiation (NRS) and transport non-repudiation (NRT) and the like.
Other non-repudiation services are available in Chapter 8 describes the general structure constructed to meet the requirements of security policy.
This section relies on a trusted third party to prevent fraudulent repudiation. Generally it requires an online trusted third party.
Non-repudiation Non-repudiation protocol provides mechanisms for the exchange of a variety of non-repudiation services provided token. Used in this section of the anti-repudiation token
By the security envelope and additional data. Non-repudiation Non-repudiation token as information to be stored, used to prepare after a dispute arises.
Repudiation of the strategy and operations in which the application is based on the particular application of an effective anti-legal environment, non-repudiation may include the following additional information
information.
a) include a trusted time stamp time stamp agencies, including the evidence;
Evidence b) notaries will be available to ensure that actions or events are executed by one or more entities or participation.
Non-repudiation before the entry into force only in a particular application and its legal environment, there is a clearly defined security policy scope.
2 Normative references
The following documents contain provisions which, through GB/T 17903 reference in this text, constitute provisions of this part. For dated references
Documents, all subsequent amendments (not including errata content) or revisions do not apply to this section, however, encouraged to reach under this section
Research into whether the parties to the agreement to use the latest versions of these documents. For undated reference documents, the latest versions apply to this
section.
Data integrity mechanism GB 15852-1995 Information technology - Security techniques used block cipher algorithm cryptographic check function
(Idt ISO /IEC 9797.1994)
GB/T 15843.4-1999 Identification Information technology - Security techniques - Entity - Part 4. Mechanisms using a cryptographic check function
(Idt ISO /IEC 9798-4.1997)
GB/T 18238.1-2000 Information technology - Security techniques - Hash - functions - Part 1. General (idt ISO /IEC 10118-1.
1994)
GB/T 17903.1-2008 Information technology - Security techniques - Non - repudiation - Part 1. General (ISO /IEC 13888-1.2004,
IDT)
3 Terms and Definitions
GB/T 17903.1-2008 The terms and definitions apply to this section.
4 Abbreviations and notation
4.1 Notation
4.1.1 GB/T 17903.1-2008 the notation
SEN Vp X X using a secret key x0 entity generated security envelopes
GB/T 17903.2-2008/ISO /IEC 13888-2.1998
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 17903.2-2021_English be delivered?Answer: Upon your order, we will start to translate GB/T 17903.2-2021_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 17903.2-2021_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 17903.2-2021_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. Question 5: Should I purchase the latest version GB/T 17903.2-2021?Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB/T 17903.2-2021 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.
|