Renewing Cryptographic Timestamps
نویسندگان
چکیده
This paper shows that the scheme described in Haber and Stornetta [Haber and Stornetta Jr., 1994] for extending the validity of a cryptographic timestamp for a Time Stamping Service contains security shortcomings. A modification is proposed to rectify the identified shortcomings.
منابع مشابه
Handling exp, × (and Timestamps) in Protocol Analysis
We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus. Rather than assuming a specific, fixed set of cryptographic primitives, we only require them to be specified through a term rewriting system, with no restrictions. Examples are provided to support our analysis. First, we tackle forward secrecy for a Diffie-Hellman-based proto...
متن کاملTimestamps for Network Authentication Protocols Revisited
In network security protocols, the freshness and uniqueness of a particular protocol-run provide a strong defense against replay attacks. These two properties are incorporated into a protocol interaction by the use of time-variant parameters such as nonces, random numbers, sequence numbers and timestamps. Many of the network authentication protocols can be classi ed into two main streams by the...
متن کاملProof of Authorship for Copyright Protection in OPELIX
Producers that create and sell digital information have a high interest to prevent malicious parties selling copies of their work or claiming that they are the true creator. In order to provide the authors of some digital information with undeniable evidences that prove the authorship we propose a timestamp mechanism. This mechanism can be applied even if the good to be protected is simple text...
متن کاملRFC 6622 ICV and Timestamp TLVs for MANETs
This document describes general and flexible TLVs for representing cryptographic Integrity Check Values (ICVs) (i.e., digital signatures or Message Authentication Codes (MACs)) as well as timestamps, using the generalized Mobile Ad Hoc Network (MANET) packet/message format defined in RFC 5444. It defines two Packet TLVs, two Message TLVs, and two Address Block TLVs for affixing ICVs and timesta...
متن کاملEngineering Task Force ( IETF ) U
This document revises, extends, and replaces RFC 6622. It describes general and flexible TLVs for representing cryptographic Integrity Check Values (ICVs) and timestamps, using the generalized Mobile Ad Hoc Network (MANET) packet/message format defined in RFC 5444. It defines two Packet TLVs, two Message TLVs, and two Address Block TLVs for affixing ICVs and timestamps to a packet, a message, a...
متن کامل