Advertisement

Some Critical Aspects of the PKIX TSP

  • Cristian Marinescu
  • Nicolae Tapus
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3677)

Abstract

Authentication, non-repudiation, and digital signatures, require the ability to determine if a data token existed at a certain moment in time when the creator’s credentials were valid. Time-stamps are tokens which contain a verifiable cryptographic link between a time value and a data representation. The paper presents some critical aspects of the X.509 Public Key Infrastructure Time Stamp Protocol, trying to suggest some possible improvements to the protocol.

Keywords

PKI security time-stamp TSA PKIX TSP 

References

  1. 1.
    Adams, C., et al.: RFC3161 Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) (2001), ftp://ftp.rfc-editor.org/in-notes/rfc3161.txt
  2. 2.
    Adams, C., Lloyd, S.: Understanding PKI. Addison-Wesley, NY (2002)Google Scholar
  3. 3.
    Housley, R., Polk, T.: Planning for PKI - Best Practices Guide for Deploying Public Key Infrastructure. John Wiley & Sons, NY (2001)Google Scholar
  4. 4.
    Marinescu, C., et al.: A Case Study of the PKI Time Stamp Protocol Based On A Practical Implementation. In: Proceedings of the CSCS15, Bucharest (2005)Google Scholar
  5. 5.
    Merill, C.R.: Time is of the Essence, CIO Magazine (2000), http://www.cio.com/archive/031500_fine.html
  6. 6.
    Pinto, F., Freitas, V.: Digital Time-stamping to Support Non Repudiation in Electronic Communications. In: Proceedings of the SECURICOM 1996, CNIT, Paris, pp. 397–406 (1996)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2005

Authors and Affiliations

  • Cristian Marinescu
    • 1
  • Nicolae Tapus
    • 1
  1. 1.University ”Politehnica” BucharestRomania

Personalised recommendations