Non Repudiation
Non Repudiation
Non Repudiation
Non-Repudiation
Non-Repudiation
A non-repudiation service provides assurance of
the origin or delivery of data in order to protect
the sender against false denial by the recipient
that the data has been received, or to protect
the recipient against false denial by the sender
that the data has been sent. Thus, a non-
repudiation service provides evidence to
prevent a person from unilaterally modifying or
terminating legal obligations arising out of a
transaction effected by computer-based means.
American Bar Association
Non-Repudiation
Legal Need:
Enough evidence to meet the legal
requirement for proof that signature /
communication occured.
Not exactly equivalent to the
cryptography standard.
Non-Repudiation
Traditional written signature delivered by mail
Can be forged.
But forging is difficult.
Name under email
Easily forged.
Digitally signed
Almost impossible to forge
Attack needs key theft
Or needs successful crypto-attack on verified and trusted
scheme.
Non-Repudiation
Types of non-repudiation:
Non-repudiation of origin
Non-repudiation of submission
Non-repudiation of delivery
Non-Repudiation
Non-repudiation request
Parties need to agree on non-repudiation
services.
Non-repudiation service involves 5 different
activities:
Non-repudiation request
Record generation
Record distribution
Record verification
Record retention
Non-Repudiation Phases
Non-repudiation request
Often implicit.
Request for attestation (additional signatures)
Record generation
Needs to involve the potential repudiator
Autonomous generation or by trusted third party
Record distribution
To trusted third party or to person requesting non-
repudiation.
Record verification
Record retention
Non-Repudiation of Origin:
Mechanisms
Originator’s Digital Signature with Certificate
Message
Digital Signature: Hash of Message encrypted with
private key of originator.
Certificate of Digital Signature: Certificate by
trusted party containing public key of originator.
Key-Revocation Possibility:
Time of key revocation is crucial, message needs
to contain a time stamp.
Stored at recipient.
Non-Repudiation of Origin:
Mechanisms
Digital Signature of a Trusted Third
Party
Originator sends message to trusted third
party and authenticates her/him-self.
Trusted third party digitally signs the
message and returns it to the originator.
Originator sends it to recipient.
Recipient stores it.
Non-Repudiation of Origin:
Mechanisms
Digital Signature of a Trusted Third
Party
Originator sends message to trusted third
party and authenticates her/him-self.
Trusted third party digitally signs the
message and returns it to the originator.
Originator sends it to recipient.
Recipient stores it.
Non-Repudiation of Origin:
Mechanisms
Digital Signature of Message Hash
Digital signatures are compute-expensive.
Calculate a secure hash of the message.
Hash is easy / fast to calculate
Impossible to find other message with the same hash.
WARNING: Analysis of secure hash functions is about a
decade behind analysis of encryption security.
MD5, SHA1 are not yet broken
But less secure than thought