Customer Support: 131 242

  • Shopping Cart
    There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

PD ISO/IEC TR 29149:2012

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Best practices for the provision and use of time-stamping services

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

30-04-2012

$443.41
Including GST where applicable

Foreword
Introduction
1 Scope
2 Terms and definitions
3 Symbols and abbreviated terms
4 Time-stamping services
5 Use cases for non-repudiation
6 Potential issues
7 Recommendations
8 Algorithms
Bibliography

Specifies how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms.

Committee
IST/33/4
DocumentType
Standard
Pages
30
PublisherName
British Standards Institution
Status
Current

This Technical Report explains how to provide and use time-stamping services so that time-stamp tokens are effective when used to provide timeliness, data integrity, and non-repudiation services in conjunction with other mechanisms. It defines:

  • how time-stamp requesters should use time-stamp token generation services;

  • how TSAs (time-stamping authorities) should provide a service of guaranteed quality;

  • how TSAs should deserve trust based on good practices;

  • which algorithms and parameters should be used in TST (time-stamp token) generation and TST renewal, so that TSTs resist during the time period during which the TSTs can be verified as being valid;

  • how time-stamp verifiers should use the time-stamp token verification services, both when validating individual TSTs, and when validating sequences of renewal TSTs.

Standards Relationship
ISO/IEC TR 29149:2012 Identical

ANSI X9.95 : 2016 FINANCIAL SERVICES - TRUSTED TIME STAMP MANAGEMENT AND SECURITY
ISO/IEC 18014-3:2009 Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens
TS 101 861 : 1.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
ISO/IEC 18014-2:2009 Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
GOST R 34-11 : 2012 INFORMATION TECHNOLOGY - CRYPTOGRAPHIC DATA SECURITY - HASH FUNCTION
ISO 7498-2:1989 Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 10118-1:2016 Information technology Security techniques Hash-functions Part 1: General
TS 102 023 : 1.2.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TIME-STAMPING AUTHORITIES
TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 9796-2:2010 Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 8824-1:2015 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Part 1:
TS 101 903 : 1.4.2 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES)
ISO/IEC 9797-2:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
FIPS PUB 180 : 2002 SECURE HASH STANDARD
TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9798-1:2010 Information technology Security techniques Entity authentication Part 1: General

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.