• PD ISO/IEC TR 29149:2012

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Best practices for the provision and use of time-stamping services

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  30-04-2012

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Terms and definitions
    3 Symbols and abbreviated terms
    4 Time-stamping services
    5 Use cases for non-repudiation
    6 Potential issues
    7 Recommendations
    8 Algorithms
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms.

    Scope - (Show below) - (Hide below)

    This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:

    • how time-stamp requesters should use time-stamp token generation services;

    • how TSAs (time-stamping authorities) should provide a service of guaranteed quality;

    • how TSAs should deserve trust based on good practices;

    • which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;

    • how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/4
    Document Type Standard
    Publisher British Standards Institution
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    ANSI X9.95 : 2016 FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY
    ISO/IEC 18014-3:2009 Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens
    TS 101 861 : 1.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 18014-2:2009 Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
    ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    GOST R 34-11 : 2012 INFORMATION TECHNOLOGY - CRYPTOGRAPHIC DATA SECURITY - HASH FUNCTION
    ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
    TS 102 023 : 1.2.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TIME-STAMPING AUTHORITIES
    TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
    ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
    ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
    ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
    ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
    TS 101 903 : 1.4.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES)
    ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
    ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
    FIPS PUB 180 : 2002 SECURE HASH STANDARD
    TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
    ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective