BS-ISO-IEC-18014-1-2002.pdf

上传人:韩长文 文档编号:3757339 上传时间:2019-09-22 格式:PDF 页数:28 大小:548.75KB
返回 下载 相关 举报
BS-ISO-IEC-18014-1-2002.pdf_第1页
第1页 / 共28页
BS-ISO-IEC-18014-1-2002.pdf_第2页
第2页 / 共28页
BS-ISO-IEC-18014-1-2002.pdf_第3页
第3页 / 共28页
BS-ISO-IEC-18014-1-2002.pdf_第4页
第4页 / 共28页
BS-ISO-IEC-18014-1-2002.pdf_第5页
第5页 / 共28页
亲,该文档总共28页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《BS-ISO-IEC-18014-1-2002.pdf》由会员分享,可在线阅读,更多相关《BS-ISO-IEC-18014-1-2002.pdf(28页珍藏版)》请在三一文库上搜索。

1、BRITISH STANDARD BS ISO/IEC 18014-1:2002 Information technology Security techniques Time-stamping services Part 1: Framework ICS 35.040 ? Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI BS ISO/IEC 18014-1:2002 This British Standard, having b

2、een prepared under the direction of the DISC Board, was published under the authority of the Standards Policy and Strategy Committee on 5 November 2002 BSI 5 November 2002 ISBN 0 580 40676 8 National foreword This British Standard reproduces verbatim ISO/IEC 18014-1:2002 and implements it as the UK

3、national standard. The UK participation in its preparation was entrusted to Technical Committee IST/33, Security techniques, which has the responsibility to: A list of organizations represented on this committee can be obtained on request to its secretary. Cross-references The British Standards whic

4、h implement international publications referred to in this document may be found in the BSI Catalogue under the section entitled “International Standards Correspondence Index”, or by using the “Search” facility of the BSI Electronic Catalogue or of British Standards Online. This publication does not

5、 purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. aid enquirers to understand the text; present to the responsible international/European com

6、mittee any enquiries on the interpretation, or proposals for change, and keep the UK interests informed; monitor related international and European developments and promulgate them in the UK. Summary of pages This document comprises a front cover, an inside front cover, the ISO/IEC title page, pages

7、 ii to v, a blank page, pages 1 to 19 and back cover. The BSI copyright date displayed in this document indicates when the document was last issued. Amendments issued since publication Amd. No. DateComments Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled

8、Copy, (c) BSI Reference number ISO/IEC 18014-1:2002(E) INTERNATIONAL STANDARD ISO/IEC 18014-1 First edition 2002-10-01 Information technology Security techniques Time-stamping services Part 1: Framework Technologies de linformation Techniques de scurit Services destampillage de temps Partie 1: Cadre

9、 gnral BS ISO/IEC 180141:2002 Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI BS ISO/IEC 180141:2002 ii Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI IS/OIE41081 C-1:2002(E) I SO/I

10、E 2002 C All irhgts seredevr iii Contents 1Scope. 1 2Normative References 1 3Terms and Definitions 1 4General Discussion on Time-stamping 2 4.1Entities of the Time-Stamping Process. 3 4.2Time-Stamps. 3 4.3Use of Time-Stamps . 3 4.4Verification of a Time-Stamp Token 4 4.5Services involved in Time-sta

11、mping . 4 5Communications between entities involved 4 5.1Time-Stamp Request Transaction 4 5.2Time-Stamp Verification Transactions 4 6Message Formats . 5 6.1Time-stamp request 5 6.2Time-stamp response . 5 6.3Time-stamp verification. 6 6.4Extension fields. 7 AASN.1 Module for time-stamping. 8 BExcerpt

12、 of the Cryptographic Message Syntax 13 Bibliography. 19 BS ISO/IEC 180141:2002 iii Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI IS/OIE41081 C-1:2002(E) vi I SO/IE 2002 C All irhgts seredevr Foreword ISO (the International Organization fo

13、r Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective or

14、ganization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information techn

15、ology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 3. The main task of the joint technical committee is to prepare International Standards. Draft International Standard

16、s adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this part of ISO/IEC 18014 ma

17、y be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 18014-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. ISO/IEC 18014 consists of the follo

18、wing parts, under the general title Information technology Security techniques Time stamping services: Part 1: Framework Part 2: Mechanisms producing independent tokens Part 3: Mechanisms producing linked tokens Further parts may follow. Annexes A and B form a normative part of this part of ISO/IEC

19、18014. BS ISO/IEC 180141:2002 iv Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI IS/OIE41081 C-1:2002(E) I SO/IE 2002 C All irhgts seredevr v Introduction The International Organization for Standardization (ISO) and International Electrotech

20、nical Commission (IEC) draw attention to the fact that it is claimed that compliance with this International Standard may involve the use of patents. ISO and IEC take no position concerning the evidence, validity and scope of this patent right. The holder of this patent right has assured the ISO and

21、 IEC that he is willing to negotiate licences under reasonable and non-discriminatory terms and conditions with applicants throughout the world. In this respect, the statement of the holder of this patent right is registered with the ISO and IEC. Information may be obtained from: ISO/IEC JTC 1/SC 27

22、 Standing Document 8 (SD 8) “Patent Information“ SD 8 is publicly available at: http:/www.din.de/ni/sc27 Attention is drawn to the possibility that some of the elements of this International Standard may be the subject of patent rights other than those identified above. ISO and IEC shall not be held

23、 responsible for identifying any or all such patent rights. BS ISO/IEC 180141:2002 v Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI D

24、RADNATS LANOITANRETNI CEI/OSI :1-41081)E(2002 CEI/OSI 2002 - devreser sthgir llA1 1 Scope This part of ISO/IEC 18014: 1. identifies the objective of a time-stamping authority; 2. describes a general model on which time- stamping services are based; 3. defines time-stamping services; 4. defines the b

25、asic protocols of time-stamping; 5. specifies the protocols between the involved entities. 2 Normative References The following normative documents contain provisions which, through reference in this text, constitute provisions of this part of ISO/IEC 18014 . For dated references, subsequent amendme

26、nts to, or revisions of, any of these publications do not apply. However, parties to agreements based on this part of ISO/IEC 18014 are encouraged to investigate the possibility of applying the most recent editions of the normative documents indicated below. For undated references, the latest editio

27、n of the normative document referred to applies. Members of ISO and IEC maintain registers of currently valid International Standards. ISO 8601:2000, Data elements and interchange formats Information interchange Representation of dates and times ISO/IEC 8824-1: 1998 | X.680: ITU-T Recommendation X.

28、680 (1997), Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation ISO/IEC 8824-2: 1998 | X.681: ITU-T Recommendation X. 681 (1997), Information technology Abstract Syntax Notation One (ASN.1): Information object specification ISO/IEC 8824-3: 1998 | X.682: ITU-T

29、 Recommendation X. 682 (1997), Information technology Abstract Syntax Notation One (ASN.1): Constraint specification ISO/IEC 8824-4: 1998 | X.683: ITU-T Recommendation X. 683 (1997), Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications ISO/IEC 8825-1:

30、 1998 | X.690: ITU-T Recommendation X. 690 (1997), Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) ISO/IEC 9798-1: 1997 Information technology Security techniques Entity authentication Par

31、t 1: General ISO/IEC 10118 (all parts), Information technology Security techniques Hash-functions ISO/IEC 11770-1: 1996 Information technology Security techniques Key management Part 1: Framework ISO/IEC 11770-3: 1999 Information technology Security techniques Key management Part 3: Mechanisms using

32、 asymmetric techniques ISO/IEC 14888-2: 1999 Information technology Security techniques - Digital signatures with appendix Part 2: Identity-based mechanisms ISO/IEC 14888-3: 1999 Information technology Security techniques - Digital signatures with appendix Part 3: Certificate-based mechanisms ISO/IE

33、C 15946-2, Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures 3 Terms and Definitions The following term is used as defined in ISO/IEC 9798- 1: entity authentication: the corroboration that an entity is the one claimed. The followi

34、ng terms are used as defined in ISO/IEC 10118-1: collision-resistant hash-function: a hash-function satisfying the following property: - it is computationally infeasible to find any two distinct inputs which map to the same output. hash-function: a function which maps strings of bits to fixed-length

35、 strings of bits, satisfying two important properties. The first property states that for a given output, it is computationally infeasible to find an input which map to this output. The second property states Information technology Security techniques Time-stamping services Part 1: Framework BS ISO/

36、IEC 180141:2002 1 Licensed Copy: sheffieldun sheffieldun, na, Thu Nov 23 03:50:49 GMT+00:00 2006, Uncontrolled Copy, (c) BSI CEI/OSI :1-41081)E(2002 CEI/OSI 0220 devreser sthgir llA -2 that, for a given output, it is computationally infeasible to find a second input which map to the same output. has

37、h value: the string of bits which is the output of a hash-function. The following terms are used as defined in ISO/IEC 11770-1: certification authority (CA): a centre trusted to create and assign public key certificates. Optionally, the certification authority may create and assign keys to the entit

38、ies. private key: that key of an entitys asymmetric key pair which should only be used by that entity. public key: that key of an entitys asymmetric key pair which can be made public. public key certificate: the public key information of an entity signed by the certification authority and thereby re

39、ndered unforgeable. sequence number: a time variant parameter whose value is taken from a specified sequence which is non- repeating within a certain time period. time-stamp: a time variant parameter which denotes a point in time with respect to a common time reference. time-variant parameter: a dat

40、a item used by an entity to verify that a message is not a replay, such as a random number, a sequence number, or a time stamp. The following terms are used as defined in ISO/IEC 11770-3: digital signature: a data appended to, or a cryptographic transformation of, a data unit that allows a recipient

41、 of the data unit to prove the origin and integrity of the data unit and protect the sender and the recipient of the data unit against forgery by third parties and sender against forgery by the recipient. trusted third party (TTP): a security authority, or its agent, trusted by other entities with r

42、espect to security related activities. For the purposes of this standard, the following definitions apply. 3.1data items representation: a data item or some representation thereof such as a cryptographic hash value. 3.2time-stamping authority (TSA): a trusted third party trusted to provide a time-st

43、amping service. 3.3time-stamping service: a service providing evidence that a data item existed before a certain point in time. Note: An example is given by adding a time-stamp to a data items representation and signing the result. 3.4time-stamp requester: an entity which possesses data it wants to

44、be time-stamped. Note: A requester may also be a Trusted Third Party including a time-stamping authority. 3.5time-stamp token: a data structure containing a verifiable cryptographic binding between a data items representation and a time-value. A time-stamp token may also include additional data item

45、s in the binding. 3.6time-stamp verifier: an entity which possesses data and wants to verify that it has a valid time-stamp bound to it. The verification process may be performed by the verifier itself or by a Trusted Third Party. 4 General Discussion on Time-stamping The use of digital data that ma

46、y be provided on easily modifiable media raises the issue of how to certify when these data were created or last changed. Digital time-stamping shall provide help to achieve a proof of timeliness. Digital time-stamping must fulfil the following requirements: A time variant parameter must be bound to

47、 the data in a non-forgeable way to provide evidence that the data existed prior to a certain point in time. Data may be provided in a way that it is not disclosed. The time-stamping methods in use solve these requirements by time-stamping the hash value of data, which allows for the control of inte

48、grity and confidentiality. The data themselves are not exposed. The datas hash will be cryptographically bound to the current time value by the TSA. This binding demonstrates the integrity and authenticity of the time- stamp. A time-stamp token providing these elements will be sent to the requester

49、of the time-stamp. Time-stamp tokens may also include information relating to previously generated tokens. Here the datas representation and additional information from data time-stamped prior to that time-stamp request are input parameters to the time-stamping process. The TSA may in addition publish various data items relating to the time-stamping process, for proof that the data was available in a timel

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1