Fact-checked by Grok 2 weeks ago

Non-repudiation

Non-repudiation is a fundamental security service in and that provides assurance to the sender of a or that proof of delivery exists and to the recipient that proof of the sender's is verifiable, preventing either party from denying their involvement in the communication or . This property ensures the and origin of can be verified by third parties, making it essential for establishing in digital interactions. In cybersecurity frameworks, non-repudiation extends the classic CIA triad (, , ) by protecting against false claims, such as an author denying authorship of a document, a sender denying transmission of a , or a receiver denying receipt of information. It is typically achieved through cryptographic mechanisms, including digital signatures, which bind a signer's to the data using public-key infrastructure (PKI), ensuring the signature cannot be forged or disowned without detection. Additional techniques, such as secure timestamps and audit logs, further support non-repudiation by providing verifiable evidence of actions at specific times. Non-repudiation plays a critical role in applications like electronic contracts, financial transactions, and secure , where it provides that can be used as proof in legal disputes—for instance, confirming a trade order or a transfer authorization. standards, such as ISO/IEC 13888-1:2020, outline mechanisms for implementing non-repudiation using cryptographic techniques to support these use cases across global digital systems.

Fundamentals

Definition

Non-repudiation is a fundamental security in information systems that assures a cannot deny having performed a specific , such as sending a or authorizing a , through the provision of evidentiary proof regarding the 's and . This ensures that the involved parties—sender or recipient—cannot plausibly dispute their role in the process, thereby fostering in digital interactions. Non-repudiation can apply to the of data (ensuring the sender cannot deny sending it) or to (ensuring the recipient cannot deny receiving it). The concept of non-repudiation was formalized in literature during the 1990s, with key early references appearing in international standards such as the ISO/IEC 13888 series; the current ISO/IEC 13888-1: outlines general models and mechanisms for generating, collecting, maintaining, and validating of claimed events or actions within a defined . A basic analogy illustrates this: just as a verified handwritten on a binds the signer to the and prevents later claims of upon , non-repudiation provides comparable binding in contexts to affirm involvement. Repudiation, by contrast, denotes the regarding participation in an event, while non-repudiation actively prevents such denials by establishing irrefutable proof that eliminates . Non-repudiation extends the traditional CIA triad—, , and —by emphasizing through verifiable actions.

Key Principles

Non-repudiation relies on core principles that ensure actions cannot be plausibly denied, primarily through the assurance of and verifiable by third parties, prevention of by involved parties, and of actions to identities. These build on the ability to generate and preserve irrefutable —such as timestamps and logs—that demonstrates the occurrence of an event or . It prevents a sender from claiming they did not originate a message or a recipient from asserting they did not receive it, thereby holding individuals accountable for their involvement. Linkage to identities ensures that evidence ties directly to specific parties, often through verified identifiers that cannot be forged or transferred. Effective non-repudiation requires strong of parties to confirm who performed an , tamper-evident to prove has not been altered, and verifiable proofs capable of withstanding legal . Strong establishes the "who" behind an , building on mechanisms to avoid impersonation. Tamper-evident maintain the integrity of information, ensuring any modifications are detectable and attributable. Verifiable proofs, such as certified acknowledgments, provide courts or auditors with reliable confirmation that meets evidentiary thresholds for admissibility. These principles build on foundational security concepts like , which proves , and , which confirms data unalteredness, but extend them by providing proof of past actions, thereby preventing plausible denials of involvement. In non-digital contexts, evidentiary standards such as audit trails and exemplify these principles; audit trails create sequential records of events for , while chain of custody documents the handling of evidence to prevent tampering. For instance, notarized documents achieve non-repudiation through a notary's of and attestation of the signing , creating a witnessed record that links the action to the individual and resists denial.

Role in Security

General Contexts

Non-repudiation plays a crucial role in non-digital environments by providing verifiable that binds actions or agreements to specific individuals, thereby preventing denials of involvement. In systems, such as those using key card access, logs capture unique identifiers associated with each entry attempt, ensuring that an individual cannot plausibly deny gaining access to a restricted area at a particular time. This mechanism supports by maintaining tamper-evident records of physical interactions, similar to how timestamped logs in systems trace movements without relying on signatures. Signed paper contracts exemplify non-repudiation in procedural contexts, where a party's handwritten , often corroborated by dates or notations, serves as proof of that cannot be disclaimed later. For instance, in transactions, the physical act of signing a creates a of , enforceable in if challenged, as the tangible resists claims when properly executed. This approach predates modern technology and relies on the inherent difficulty of replicating authenticated physical marks. In broader access control frameworks, non-repudiation integrates through methods like , which irrevocably link an action—such as entering a secure facility—to the responsible party. Biometric scans, for example, record physiological traits like fingerprints tied to personal identities, providing irrefutable evidence of participation and deterring unauthorized or deniable access. Procedural mechanisms, including notaries and witnesses, have long served as human elements to bind actions in non-digital settings, with roots in historical contract law. Notaries function as official witnesses who verify identities and voluntariness during signing, creating a legal against repudiation by attesting to the absence of or . This practice traces back to ancient systems, such as , where seals impressed on wax or clay documents authenticated authorship and ownership, making claims of denial incontestable in legal disputes. These seals, often personalized with intaglios, ensured documents' integrity and origin, forming the basis for non-repudiation in pre-digital . The benefits of non-repudiation in general extend to organizational , particularly in compliance frameworks like ISO 27001, where employee action logs—such as those tracking physical inventory checks or facility accesses—enable audits to attribute responsibilities without dispute. By mandating detailed records of personnel activities, these logs foster a of , reducing risks of internal misconduct and supporting incident investigations with verifiable proof.

Digital Contexts

In digital security frameworks, non-repudiation serves as a critical to provide verifiable proof of the and of within electronic systems, ensuring that parties cannot deny their involvement in creating, sending, or approving information. Unlike , which primarily verifies the of a user or entity at a specific point, non-repudiation focuses on establishing undeniable of actions taken, such as the of a or the modification of a file, thereby fostering trust in automated and networked environments. This property is essential in preventing disputes over in scenarios like electronic communications and system audits. Non-repudiation integrates into broader digital security models by extending the traditional CIA triad—, , and —to include measures, as outlined in NIST standards. Specifically, it enhances the component by ensuring not only that data remains unaltered but also that its and can be irrefutably tied to a responsible party, supporting overall . In this extended model, non-repudiation complements and , forming a comprehensive for securing IT systems against of actions. Common digital scenarios where non-repudiation is applied include file access logs and network transmissions, where it prevents users from denying their interactions with sensitive resources. For instance, in secure systems, non-repudiation ensures that a sender cannot later disavow a digitally signed , providing that the communication originated from them and arrived unaltered. Similarly, in audit trails for system access, it logs actions with verifiable attribution, aiding in incident response and compliance verification. While integrity protects against unauthorized tampering by detecting modifications to data, non-repudiation builds on this by adding for the sender, making it possible to prove who initiated or endorsed the data. Message authentication codes (MACs), for example, offer strong and through symmetric keys but fail to provide non-repudiation, as either party holding the shared key could plausibly generate the code, lacking proof of specific origin. This distinction underscores non-repudiation's unique role in establishing legal and operational irrefutability in digital interactions.

Mechanisms for Implementation

Cryptographic Techniques

Cryptographic techniques form the cornerstone of non-repudiation by leveraging mathematical properties to bind actions to specific entities in a verifiable manner. The primary method is digital signatures, which utilize asymmetric cryptography to ensure that only the holder of a private can produce a signature, while anyone with the corresponding public can verify it, thereby providing proof of origin that the signer cannot plausibly deny. Common algorithms include , based on the difficulty of , which requires sizes of at least 2048 bits for security strengths up to bits, and ECDSA, an elliptic curve variant offering equivalent security with smaller keys, such as 256 bits providing at least 128 bits of security. These algorithms support non-repudiation by linking the signature to the signer's private , with relying on the public to confirm and . The process begins with applying a collision-resistant to the message, producing a fixed-size digest that represents the message efficiently. For instance, SHA-256, a member of the Secure Hash Algorithm family, generates a 256-bit output and is designed such that finding two inputs with the same hash (a collision) is computationally infeasible, ensuring the digest's integrity. The signer then encrypts this hash using their private key to create the , formalized as: \signature = \encrypt(\hash(\message), \privatekey) Verification involves decrypting the signature with the public key and comparing the result to a freshly computed hash of the received message; a match confirms both the origin and unaltered state. This combination of hashing and asymmetric encryption ensures non-repudiation, as the private key's secrecy prevents forgery, and the public key enables independent validation by third parties. To further strengthen non-repudiation against temporal disputes, digital timestamping incorporates a trusted time value into the process. Trusted time-stamping authorities (TSAs) issue digital timestamps that bind a of the to a specific point in time, proving the document's existence prior to that moment and preventing backdating claims. The Time-Stamp Protocol (TSP) in RFC 3161 enables this by having the TSA sign a containing the , a , and the (genTime), allowing that the signature was created during a certificate's validity period. Privacy-preserving variants include blind signatures, pioneered by , which allow a signer to produce a valid on a message without knowing its content, thus maintaining user anonymity while preserving non-repudiation upon unblinding. In contrast, symmetric techniques like (Hash-based Message Authentication Code) use a shared secret key with a to authenticate messages and detect tampering but fall short for full non-repudiation, as the symmetric key enables either party to generate the tag, lacking third-party provability without key disclosure; asymmetric signatures remain superior for robust, publicly verifiable non-repudiation. Standards such as the , an update to , define formats for signed and enveloped data, enabling the encapsulation of digital signatures to support non-repudiation in structured messages like emails. Complementing this, certificates include a key usage extension with a nonRepudiation bit (OID 2.5.29.15, bit 1), indicating that the certified public key is intended for signatures providing non-repudiation of content commitment.

Trusted Third Parties

Trusted Third Parties (TTPs) serve as neutral entities in non-repudiation systems, providing independent verification and assurance to prevent parties from denying their actions or commitments in digital transactions. These parties facilitate key certification, identity binding, time-stamping, evidence notarization, and , acting as intermediaries to establish trust without direct involvement in the primary communication. Certificate Authorities (CAs) represent a primary type of TTP, issuing digital certificates that bind a user's public to their verified identity, thereby enabling non-repudiation through attributable digital signatures. CAs validate identities through rigorous processes, such as document checks or biometric confirmation, before signing the certificate with their own private . To handle compromised keys, CAs publish Certificate Revocation Lists (CRLs), periodically updated lists that relying parties consult to confirm a certificate's validity. A notable example is the U.S. Department of Defense's (CAC), where the CA issues certificates stored on a , and access to the private requires a user-entered PIN to ensure only the authorized holder can sign, reinforcing non-repudiation. Beyond , other TTPs include timestamp authorities that affix cryptographically secure to documents or signatures, proving creation or receipt at a specific time to counter denial claims. Notaries, in contexts, act as TTPs by attesting to the signer's and intent during transaction execution, similar to traditional notarial seals but using electronic verification. Forensic analysts function as TTPs in , examining logs, signatures, and evidence chains to independently verify the integrity and origin of disputed actions, often in legal or scenarios. services, another TTP variant, manage private keys or key shares in high-stakes transactions, releasing them only under predefined conditions to balance recovery needs with non-repudiation assurances. Protocols involving TTPs enhance non-repudiation by integrating procedural safeguards. systems employ TTPs to hold encrypted key components, allowing authorized recovery for decryption while restricting access to prevent undermining signature attribution. The (OCSP), defined in RFC 6960, enables real-time queries to a TTP responder for a certificate's status, delivering signed responses that confirm validity at the moment of use, thus supporting reliable non-repudiation in dynamic environments. The concept of TTPs gained prominence in the 1990s alongside the development of (PKI) frameworks, addressing trust gaps in emerging digital commerce. A key milestone was VeriSign's establishment as the first commercial in April 1995, spun off from Data Security, which issued its inaugural digital to a law firm shortly thereafter, pioneering identity-bound certificates for secure online interactions.

Applications

Non-repudiation plays a pivotal role in legal frameworks by ensuring that electronic signatures and records hold the same evidentiary weight as traditional handwritten signatures, thereby facilitating enforceable digital agreements. In the United States, the Electronic Signatures in Global and National Commerce Act (ESIGN Act) of 2000 provides federal legal recognition to electronic signatures, stipulating that they are valid and enforceable to the same extent as wet-ink signatures when parties consent to their use. This equivalence extends to non-repudiation, as electronic signatures incorporate audit trails that record signer identity, timestamps, and device details, preventing denial of authorship. Similarly, in the , the eIDAS Regulation (No 910/2014) establishes a harmonized framework for electronic signatures, granting qualified electronic signatures the same legal effect as handwritten ones across member states, with built-in non-repudiation through cryptographic validation and trusted service providers. The original eIDAS Regulation has been updated by eIDAS 2.0 (Regulation (EU) 2024/1183), effective from May 20, 2024, which introduces the European Digital Identity Wallet to bolster secure and non-repudiable digital interactions across the EU, with full implementation phased through 2026. In contractual applications, non-repudiation underpins the integrity of electronic contracts (e-contracts), ensuring that parties cannot disavow their agreement once executed. For instance, in online purchases, digital signatures confirm the buyer's intent and provide irrefutable proof of transaction details, mitigating disputes over order confirmations or payment authorizations. Non-disclosure agreements (NDAs) similarly leverage advanced electronic signatures to bind parties to confidentiality obligations, with non-repudiation features like timestamped logs serving as evidentiary proof in case of breaches. These mechanisms enable seamless digital workflows while upholding contractual enforceability, as parties are legally barred from repudiating signed terms. During , non-repudiable records function as in litigation, bolstering the credibility of digital documents in . Electronically signed PDFs, for example, are recognized as court-admissible when they include verifiable trails and comply with jurisdictional standards, allowing judges to rely on them without challenges. Digital signatures further support non-repudiation by demonstrating to third parties, such as arbitrators, that the signer indeed authorized the document. International variations in non-repudiation adoption arise from differing regulatory approaches, particularly regarding qualified electronic signatures in GDPR-compliant regions. Under , qualified signatures in the require validation by accredited qualified trust service providers (QTSPs) to ensure high-assurance non-repudiation, integrating with GDPR's data protection mandates for processing signer . In contrast, the U.S. ESIGN Act offers broader flexibility without mandatory QTSP-like validation, leading to varied implementation across states, though both frameworks prioritize cross-border enforceability. A notable case illustrating non-repudiation's legal weight in blockchain-based contracts is the 2019 Singapore High Court decision in B2C2 Ltd v Quoine Pte Ltd, where errors on a were disputed. The court upheld the enforceability of automated "smart contract" executions, emphasizing 's immutable as providing non-repudiable evidence of transactions, which prevented the exchange from denying the validity of executed trades despite claims of malfunction. This ruling underscored how distributed ledger technology enhances contractual binding in digital disputes, influencing global recognition of blockchain non-repudiation.

Communication and Transactions

Non-repudiation plays a critical role in digital communications by ensuring that senders cannot deny the origin or content of messages, particularly in email and secure messaging systems. Protocols such as Secure/Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP) enable this through digital signatures that authenticate the sender and protect message integrity. S/MIME, standardized by the Internet Engineering Task Force (IETF), uses public-key cryptography to generate signatures that provide proof of origin, preventing denial of transmission. Similarly, PGP employs asymmetric encryption for signed messages, allowing recipients to verify the sender's identity via key pairs. Certificate management for these protocols is facilitated by standards such as RFC 8551 for S/MIME Version 4.0 and RFC 8550 for certificate handling, with enrollment and revocation supported through protocols like Certificate Management over CMS (CMC, RFC 5272/5273) to maintain trust in signatures. In transactional systems, non-repudiation ensures the irrevocability of actions in e-commerce and banking, where unique transaction identifiers combined with digital signatures create auditable logs of events. For instance, in e-commerce platforms, payment confirmations are signed to bind the buyer and seller to the agreement, reducing disputes over completed purchases. In banking, non-repudiation of origin and emission links users to initiated transfers, protecting against fraudulent denials through timestamped signatures on transaction records. These mechanisms provide a verifiable trail that confirms both the initiation and receipt of funds, essential for high-volume financial operations. Supply chain management leverages non-repudiation for tracking shipments, often using to and immutably record delivery proofs. 's ensures that once a shipment status is updated—such as arrival at a —it cannot be altered or denied by participants, providing non-deniable evidence across the chain. For example, in for or maritime shipping, smart contracts on permissioned blockchains automate confirmations with cryptographic proofs, enabling all parties to validate handoffs without intermediaries. The operational benefits of non-repudiation extend to reducing in transfers, particularly in mobile applications that employ token-based signatures for quick, secure exchanges. These tokens, generated via signatures, tie actions to specific users, preventing denial in scenarios like mobile payments or . By establishing irrefutable proof of participation, such systems minimize chargebacks and unauthorized reversals in decentralized transfers. Adoption of secure messaging has surged post-2020, driven by the rise of during the , with the global secure messaging app market expanding due to increased demand for verifiable communications. Protocols supporting signing, such as those in tools, have seen broader integration, while apps like Signal, focused on and , experienced significant growth from approximately 20 million monthly active users in late 2020 to 70 million by 2024, reflecting heightened awareness of secure, attributable messaging.

Challenges and Developments

Technical Limitations

One significant technical limitation of non-repudiation systems arises from the risk of private key compromise, where theft or loss of the private key used for digital signatures can undermine the entire mechanism by allowing unauthorized forging of signatures or denial of authenticity. The security of digital signatures relies heavily on protecting this private key, as its exposure enables attackers to impersonate the signer and generate valid-looking proofs of origin that the legitimate user cannot refute. Mitigations such as (MFA) for key access, including hardware security modules or biometric-bound authenticators, aim to reduce these risks by requiring multiple verification factors before key usage. However, persistent vulnerabilities remain, as MFA does not eliminate threats like insider attacks, malware-induced key extraction, or physical coercion that could still bypass protections and compromise non-repudiation. Replay attacks pose another challenge, where intercepted signed messages with reused nonces or timestamps can be resent to trick systems into accepting duplicate actions as legitimate, potentially violating the intended non-repudiation of unique events. Digital signatures alone do not inherently protect against such replays, as they verify and origin but not timeliness or uniqueness of the transaction. Common mitigations include incorporating sequence numbers or fresh timestamps in the signed data to detect and reject replays, often enforced at the level. Despite these measures, they are not foolproof, as attackers may exploit issues, nonce prediction, or weaknesses to reuse valid elements and evade detection. Scalability issues further limit non-repudiation in large-scale deployments, primarily due to the high computational overhead of asymmetric , such as or operations required for generation and , which create performance bottlenecks in high-volume systems. Public key infrastructures (PKIs) supporting non-repudiation must manage vast numbers of s and keys, leading to challenges in issuance, , and validation that strain resources as user bases grow. For instance, verifying signatures in real-time across distributed networks demands significant processing power, often resulting in that hampers applications like high-frequency transactions. Interoperability problems exacerbate these limitations, as variations in digital signature standards—such as differences between and ()—can cause validation failures when signatures generated on one platform fail to verify on another due to incompatible parameters or encoding. For example, 's use of specific curve parameters may not align with -based systems without standardized bridging, leading to errors in cross-platform non-repudiation enforcement. These discrepancies arise from evolving standards and implementation choices, complicating seamless integration in heterogeneous environments. Specific threats like side-channel attacks on further weaken non-repudiation by exploiting physical or timing leaks during cryptographic operations in signature libraries, potentially recovering keys without direct . In 2023, CVE-2023-6135 highlighted a side-channel in Firefox's cryptographic that could enable key through timing , affecting -based . Similarly, Marvin-related side-channel leaks in Kernel's operations (CVE-2023-6240) demonstrated how flaws in -related decryption could indirectly compromise security in non-repudiation contexts. These attacks underscore the need for constant auditing of libraries like or Bouncy Castle to mitigate such hardware-dependent risks. Recent advancements in non-repudiation are driven by the need to counter vulnerabilities in traditional cryptographic systems and enhance , , and in digital environments. One critical area is the response to threats, where algorithms like Shor's (1994) pose risks to asymmetric cryptography underlying digital signatures, potentially undermining and non-repudiation by efficiently factoring large integers and solving problems. To mitigate this, alternatives, particularly lattice-based signatures, have gained prominence; the National Institute of Standards and Technology (NIST) finalized standards in 2024, including FIPS 204 for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA, based on CRYSTALS-Dilithium), which provides quantum-resistant digital signatures suitable for non-repudiation. Blockchain integration represents another key trend, enabling through immutable distributed ledgers that eliminate reliance on trusted third parties by recording transactions in a tamper-evident manner. On platforms like , smart contracts facilitate self-enforcing agreements, where the blockchain's consensus mechanisms ensure that executed actions cannot be denied, as seen in the post-2020 surge of (DeFi) applications that leverage these for automated, verifiable transactions. Zero-knowledge proofs, such as zk-SNARKs, are emerging to balance non-repudiation with by allowing parties to prove the occurrence of an action or transaction without disclosing underlying details, thus supporting confidential yet verifiable communications. For instance, in blockchain-based confidential transactions, zk-SNARKs enable proof of validity (e.g., sufficient funds) while concealing amounts and identities, enhancing non-repudiation in privacy-sensitive scenarios like financial exchanges. The integration of (AI) is also advancing non-repudiation through automated in logs, strengthening evidence integrity by identifying tampering or irregularities in real-time. In 2025, pilot programs in sectors, such as financial auditing, are deploying AI-driven tools to analyze logs for deviations, ensuring robust, non-repudiable records that support forensic investigations and meet standards like 21 CFR Part 11 for electronic signatures. Globally, regulatory frameworks are evolving to incorporate these innovations; the EU's (effective 2024 via Regulation (EU) 2024/1183) mandates quantum-resistant options for and trust services, promoting the adoption of post-quantum algorithms in Digital Identity Wallets to safeguard non-repudiation against future threats.

References

  1. [1]
    What is nonrepudiation and how does it work? - TechTarget
    Aug 20, 2021 · Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  2. [2]
    Non-repudiation - IBM
    In general, non-repudiation applies when data is transmitted electronically; for example, an order to a stock broker to buy or sell stock, or an order to a bank ...
  3. [3]
    ISO/IEC 13888-1:2004 - IT security techniques — Non-repudiation
    This part of ISO/IEC 13888:2004 serves as a general model for subsequent parts specifying non-repudiation mechanisms using cryptographic techniques.
  4. [4]
    non-repudiation - Glossary | CSRC
    Definitions: A service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified and ...
  5. [5]
    ISO/IEC 13888-1:1997 - Security techniques — Non-repudiation
    Security techniques — Non-repudiationPart 1: General. Withdrawn (Edition 1, 1997).
  6. [6]
    [PDF] ISO/IEC 13888-1:1997 - iTeh Standards
    Jul 3, 2018 · The goal of the Non-repudiation service is to generate, collect, maintain, make available and validate evidence concerning a claimed event or ...
  7. [7]
    Authenticity vs. Non-Repudiation - UpGuard
    Jan 5, 2025 · Because non-repudiation only determines the validity of the inbound message (not altered or modified), it's important to maintain authenticity ...
  8. [8]
    The Five Pillars of Information Security: CIA Triad and More
    Oct 25, 2025 · Non-repudiation is defined as the ability to prove the occurrence of a claimed event or action and its originating entities. In simpler terms, ...
  9. [9]
    Data Origin Authentication vs Non Repudiation?
    Nov 19, 2022 · 'Origin authentication' is more for signatures. Non-repudiation is a stronger requirement that builds on this. MACs don't offer non-repudiation ...
  10. [10]
  11. [11]
    What Are Access Controls? - ConductorOne
    Jun 4, 2025 · Non-repudiation: The access control system must be able to provide evidence of who or what accessed a particular resource, and when, so that ...Types Of Access Control? · How Does Access Control Work... · Challenges In Modern Access...
  12. [12]
    Non-repudiation in a Signed Email - Definition - GlobalSign Support
    Jun 6, 2025 · Non-repudiation is a feature of a digital signature which allows the author, or "signer", of a message to prove his identity.<|separator|>
  13. [13]
  14. [14]
    [PDF] Indiana Notary Public Guide - INBiz - IN.gov
    May 20, 2024 · The role of a notary is to be an impartial witness to a signature, oath or affidavit. A notarial act serves as a legal attestation to, and ...<|separator|>
  15. [15]
    [PDF] Trust & Authenticity
    Nov 4, 2014 · Archival concepts are grounded in Roman Law ... – makes the authorship or ownership indisputable and incontestable (non-repudiation).
  16. [16]
    Non-repudiation - ISMS.online
    Non-repudiation is a fundamental concept in cybersecurity, ensuring that individuals or entities cannot deny the authenticity of their digital actions.
  17. [17]
    [PDF] An Introduction to Information Security
    All comments are subject to release under the Freedom of Information Act (FOIA). Page 4. NIST SP 800-12 REV. ... signer non-repudiation. SOURCE: FIPS 140-2.
  18. [18]
    Sign and Encrypt Emails in Microsoft Outlook - IDManagement.gov
    Digitally signed emails give us confidence that the individual who claimed to send a message actually did (non-repudiation) and that the message was not ...
  19. [19]
    message authentication code (MAC) - Glossary | CSRC
    A MAC is a cryptographic checksum using a symmetric key to detect data modifications, providing authenticity and integrity, but not non-repudiation.
  20. [20]
    [PDF] Recommendation for Key Management: Part 1 - General
    May 5, 2020 · This document provides general guidance and best practices for managing cryptographic keying material, including security services, algorithms, ...<|separator|>
  21. [21]
    [PDF] Digital Signature Standard (DSS) - NIST Technical Series Publications
    Feb 5, 2024 · This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time. A digital signature algorithm is ...
  22. [22]
    None
    ### Summary of SHA-256 Hash Function from FIPS PUB 180-4
  23. [23]
    RFC 3161 - Internet X.509 Public Key Infrastructure - IETF Datatracker
    The TSA is a TTP that creates time-stamp tokens in order to indicate that a datum existed at a particular point in time.
  24. [24]
    [PDF] Blind signatures for untraceable payments
    David Chaum. (3) Ability to stop use of payments media reported stolen. BLIND ... The paper analog of a blind signature can be implemented with carbon paper.
  25. [25]
    RFC 5652: Cryptographic Message Syntax (CMS)
    This document describes the Cryptographic Message Syntax (CMS). This syntax is used to digitally sign, digest, authenticate, or encrypt arbitrary message ...
  26. [26]
    RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
    Below is a merged summary of the X.509 Certificates' Key Usage for Non-Repudiation in Digital Signatures, based on RFC 5280. To retain all information in a dense and comprehensive format, I’ve organized the key details into a table followed by a concise narrative summary. The table captures the technical specifics, while the narrative ties together the broader context and additional notes.
  27. [27]
    [PDF] Introduction to public key technology and the federal PKI infrastructure
    Sep 13, 2021 · If a TTP binds the public key to a user or system – that is, attests to the identity of the party holding the corresponding private key - the ...
  28. [28]
    Non Repudiation for Web Transactions
    The simplest way to obtain non-repudiation of origin is simply by using regular digital signatures. The sender signs the data with his/her private signature key ...
  29. [29]
    Understanding Digital Signatures | CISA
    Feb 1, 2021 · Digital signatures work by proving that a digital message or document was not modified—intentionally or unintentionally—from the time it was ...
  30. [30]
    About - DoD Cyber Exchange
    Technical non-repudiation can be considered a form of attribution, namely that the digitally signed information can be attributed to the entity identified in ...
  31. [31]
    DoD Common Access Card - CAC.mil
    The CAC, a "smart" card about the size of a credit card, is the standard identification for active duty uniformed Service personnel.Getting Your CAC · CAC Security · Managing Your CAC · Developer Resources
  32. [32]
    [PDF] A decentralized optimistic non-repudiation protocol for data exchanges
    Sep 2, 2025 · The notary ensures that the consumer can only access data upon reception of the signed ACK, allowing both parties to resolve disputes by present ...
  33. [33]
    [PDF] The Risks of Key Recovery, Key Escrow, and Trusted Third-Party ...
    Some systems provide properties analogous to those of handwritten signatures, including \non-repudiation" { the recipient can prove to a third party that a ...
  34. [34]
    RFC 6960: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP
    ### Summary: OCSP Support for Certificate Validation in PKI Relevant to Non-Repudiation
  35. [35]
    History of VeriSign, Inc. – FundingUniverse
    VeriSign, Inc. was spun off from RSA Data Security Inc., a leader in encryption technology, in April 1995 and began developing Digital ID's for corporations and ...
  36. [36]
    US electronic signature laws and history - Docusign
    Jul 3, 2025 · The ESIGN Act is a federal law passed in 2000. It grants legal recognition to electronic signatures and records if all parties to a contract choose to use ...Missing: repudiation | Show results with:repudiation
  37. [37]
    How Do Electronic Signatures (E-Signatures) Work? - Folderit
    Mar 18, 2024 · Non-repudiation: E-signatures are accompanied by digital audit trails, recording the signer's IP address, device used, and the timestamp of ...
  38. [38]
    Electronic signature legal validity in the European Union - Signaturit
    Jun 11, 2025 · The eIDAS Regulation No 910/2014 serves as the primary legal framework governing electronic signatures across all EU member states. This ...
  39. [39]
    Do Digital Signatures Provide Non-repudiation? - Cryptomathic
    Jun 14, 2017 · Digital signatures (combined with other measures) can offer non-repudiation when it comes to online transactions.
  40. [40]
    Beyond Doubt: The Power of Non-Repudiation in Digital Transactions
    Feb 27, 2024 · Non-Repudiation in Online Purchases: In the realm of e-commerce, non-repudiation is essential for establishing trust between buyers and sellers.
  41. [41]
    Advanced electronic signature: how it works and use cases
    Jun 18, 2025 · The advanced electronic signature serves as a digital means to validate documents, contracts, or transactions with an emphasis on security, integrity, and non- ...
  42. [42]
    Are Electronically Signed PDFs Court Admissible? - Foxit
    Jul 29, 2022 · Yes, electronically signed PDFs and documents will legally stand up in court. To ensure that PDF are court admissible, it is essential that certain criteria ...Missing: non- repudiation
  43. [43]
    5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC ...
    Non-Repudiation: The recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact ...<|control11|><|separator|>
  44. [44]
    [PDF] Z KDD E d/KE^ FOR QTSPs BASED ON STANDARDS - ENISA
    A qualified validation service for qualified electronic signatures may only be provided by a qualified trust service provider who: (a) provides validation ...Missing: variations | Show results with:variations
  45. [45]
    GDPR Electronic Signatures: Compliance Guide for Businesses
    Rating 4.5 (93) Apr 30, 2025 · This guide explains how GDPR impacts your e-signature processes and provides practical advice for maintaining compliance while digitizing your document ...Missing: TTP | Show results with:TTP
  46. [46]
    Legality of Electronic Signatures in the EU and the US - Infosec
    Mar 5, 2015 · According to the Directive, the qualified electronic signature is an advanced electronic signature which is based on a qualified certificate and ...Missing: variations TTP validation
  47. [47]
    Implications for cryptocurrency trading, smart contracts and AI
    Singaporean court's decision in relation to cryptocurrency trading has implications for cryptocurrency trading mistakes, smart contracts, artificial ...Missing: non- | Show results with:non-
  48. [48]
    [PDF] Ten Risks of PKI: What You're not Being Told about Public Key ...
    PKI risks include: who to trust, who is using your key, and how secure the verifying computer is. Security is only as strong as the weakest link.
  49. [49]
    [PDF] NIST.SP.800-63B-4.pdf
    Multi-factor cryptographic authenticators encapsulate one or more authentication keys ... Authentication: An API for accessing Public Key Credentials - Level 2.
  50. [50]
    digital signature - Glossary | CSRC
    When used appropriately, a digital signature can provide assurance of data integrity, origin authentication, and signatory non-repudiation. See [FIPS 186-3] for ...
  51. [51]
    [PDF] Security: Integrity, Authentication, Non-repudiation
    Alice wants to provide confidentiality, sender authentication, and message integrity. Alice uses three keys: her private key, Bob's public key, newly created ...
  52. [52]
    [PDF] Towards a Hybrid Public Key Infrastructure (PKI): A Review
    Certificate-based PKI suffers from two main problems,namely scalability and certifi- ... non-repudiation can't be achieved due to key escrow problem [38] ...
  53. [53]
    Overcoming Common Challenges In PKI Management
    Jun 17, 2025 · Explore common PKI management challenges and discover practical solutions to enhance security, compliance, and scalability in modern ...
  54. [54]
    Failures of public key infrastructure: 53 year survey - arXiv
    Legal issues surrounding non-repudiation, where individuals may be held legally responsible for actions taken with their private keys, even if those actions ...
  55. [55]
    Federal Information Processing Standard (FIPS) 186-4, Digital ...
    Oct 20, 2015 · Past discussions on this topic have cited several possible reasons for this, including interoperability issues, performance characteristics, ...
  56. [56]
    [PDF] Interoperability Guidelines for Digital Signature Certificates issued ...
    Feb 4, 2021 · Another major problem of interoperability arose from issuance of various different classes of certificates by each of the. Certifying ...
  57. [57]
    [PDF] ETSI TS 119 312 V1.4.3 (2023-08)
    The present document focuses on interoperability issues and does not duplicate security considerations given by other ... 1. DSA. Digital Signature Algorithm. EC.
  58. [58]
  59. [59]
    CVE-2023-6240 : A Marvin vulnerability side-channel leakage was ...
    A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ...
  60. [60]
    A Side-Channel Attack on a Masked Hardware Implementation of ...
    This paper presents a side-channel attack on a masked hardware implementation of CRYSTALS-Kyber, using power analysis to recover the message during decryption.
  61. [61]
    Navigating quantum security risks in networked environments
    In particular, quantum computing, leveraging Shor's algorithm, threatens the authenticity and non-repudiation provided by digital signatures. Digital ...
  62. [62]
    Preparing for 'Q Day': A Primer on the Quantum Threat and ... - Zscaler
    Oct 31, 2025 · Shor's Algorithm is a quantum computing algorithm designed to factorize large integers and solve the discrete logarithm problem exponentially ...
  63. [63]
    NIST Releases First 3 Finalized Post-Quantum Encryption Standards
    Aug 13, 2024 · The standard uses the CRYSTALS-Dilithium algorithm, which has been renamed ML-DSA, short for Module-Lattice-Based Digital Signature Algorithm.
  64. [64]
    FIPS 204, Module-Lattice-Based Digital Signature Standard | CSRC
    This standard specifies ML-DSA, a set of algorithms that can be used to generate and verify digital signatures.
  65. [65]
    Blockchain-Driven Smart Contracts for Advanced Authorization and ...
    Immutable transaction logs recorded on the Ethereum PoA chain ensure non-repudiation. To further strengthen the system, we addressed flash loan and oracle ...
  66. [66]
    Ensuring Integrity in Digital Transactions: The Importance of Non ...
    Oct 17, 2024 · Non-repudiation is a security service that ensures the integrity and origin of data. It affirms that a sender cannot convincingly deny having sent a message.Missing: custody | Show results with:custody
  67. [67]
    zk-agreements: A privacy-preserving way to establish deterministic ...
    We analyze the security of zk-agreements in the standard cryptographic game-based framework. The protocol achieves privacy, integrity, and non-repudiation ...
  68. [68]
    [PDF] ZK-NR: A Layered Cryptographic Architecture for Explainable Non ...
    This paper introduces ZK-NR, a modular cryptographic protocol designed to ensure privacy-preserving non-repudiation in the co-production of dig- ital public ...
  69. [69]
    What Is An Audit Trail? A Complete Guide in 2025 - Spendflo
    Sep 18, 2025 · This is foundational to secure audit log storage and non-repudiation. ... Use of AI/ML for anomaly detection and predictive analytics. Layer AI ...
  70. [70]
  71. [71]
    European Digital Identity (EUDI) Regulation
    Regulation (EU) 2024/1183 establishing the European Digital Identity Framework has entered into force. The framework mandates Member States to provide EU ...
  72. [72]
    [PDF] The many features which make the eIDAS 2 Digital Wallet either ...
    In April 2024, the EU recommended general action by the Member States to prepare for quantum capability. We suggest that the European Digital Identity Wallet ...Missing: 2.0 | Show results with:2.0