• Shopping Cart
    There are no items in your cart

PD ISO/IEC TR 29149:2012

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Best practices for the provision and use of time-stamping services

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

30-04-2012

€236.17
Excluding VAT

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 Time-stamping services
5 Use cases for non-repudiation
6 Potential issues
7 Recommendations
8 Algorithms
Bibliography

Specifies how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms.

Committee
IST/33/4
DocumentType
Standard
Pages
30
PublisherName
British Standards Institution
Status
Current

This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:

  • how time-stamp requesters should use time-stamp token generation services;

  • how TSAs (time-stamping authorities) should provide a service of guaranteed quality;

  • how TSAs should deserve trust based on good practices;

  • which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;

  • how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.

Standards Relationship
ISO/IEC TR 29149:2012 Identical

ANSI X9.95 : 2016 FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY
ISO/IEC 18014-3:2009 Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 18014-2:2009 Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens
ISO/IEC 10181-3:1996 Information technology — Open Systems Interconnection — Security frameworks for open systems: Access control framework
ISO/IEC 9594-8:2017 Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks
GOST R 34-11 : 2012 INFORMATION TECHNOLOGY - CRYPTOGRAPHIC DATA SECURITY - HASH FUNCTION
ISO 7498-2:1989 Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 10118-1:2016 Information technology — Security techniques — Hash-functions — Part 1: General
ISO/IEC 10181-4:1997 Information technology — Open Systems Interconnection — Security frameworks for open systems: Non-repudiation framework — Part 4:
ISO/IEC 9796-2:2010 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
ISO/IEC 8824-1:2015 Information technology — Abstract Syntax Notation One (ASN.1): Specification of basic notation — Part 1:
ISO/IEC 9797-2:2011 Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 11770-1:2010 Information technology — Security techniques — Key management — Part 1: Framework
FIPS PUB 180 : 2002 SECURE HASH STANDARD
ISO/IEC 18014-1:2008 Information technology — Security techniques — Time-stamping services — Part 1: Framework
ISO/IEC 11770-3:2015 Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology — Security techniques — Entity authentication — Part 1: General

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

€236.17
Excluding VAT