Some Critical Aspects of the PKIX TSP

  • Cristian Marinescu
  • Nicolae Tapus
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)


Authentication, non-repudiation, and digital signatures, require the ability to determine if a data token existed at a certain moment in time when the creator’s credentials were valid. Time-stamps are tokens which contain a verifiable cryptographic link between a time value and a data representation. The paper presents some critical aspects of the X.509 Public Key Infrastructure Time Stamp Protocol, trying to suggest some possible improvements to the protocol.


PKI security time-stamp TSA PKIX TSP 


  1. 1.
    Adams, C., et al.: RFC3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) (2001),
  2. 2.
    Adams, C., Lloyd, S.: Understanding PKI. Addison-Wesley, NY (2002)Google Scholar
  3. 3.
    Housley, R., Polk, T.: Planning for PKI - Best Practices Guide for Deploying Public Key Infrastructure. John Wiley & Sons, NY (2001)Google Scholar
  4. 4.
    Marinescu, C., et al.: A Case Study of the PKI Time Stamp Protocol Based On A Practical Implementation. In: Proceedings of the CSCS15, Bucharest (2005)Google Scholar
  5. 5.
    Merill, C.R.: Time is of the Essence, CIO Magazine (2000),
  6. 6.
    Pinto, F., Freitas, V.: Digital Time-stamping to Support Non Repudiation in Electronic Communications. In: Proceedings of the SECURICOM 1996, CNIT, Paris, pp. 397–406 (1996)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Cristian Marinescu
    • 1
  • Nicolae Tapus
    • 1
  1. 1.University ”Politehnica” BucharestRomania

Personalised recommendations