Non Repudiation

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Non-repudiation

Introduction

 The certainty that someone cannot dispute the legitimacy of anything is known as
non-repudiation.
 Non-repudiation is a regulatory notion commonly used in cybersecurity and refers to
the service that confirms the origin and integrity of data.
 It assures that no party can deny sending or receiving a communication using
encryption and digital signatures.
 It cannot also contest the legitimacy of its digital signature on a document.
 Non-repudiation provides evidence of data's origin, authenticity, and integrity. It
verifies the sender that the information is sent and the recipient's identity to the
receiver.
 Neither side can dispute that communication happened or was processed in this
manner.
How Does Non-Repudiation Help in Cyber
Security?

 Non-repudiation uses cryptography, similar to digital signatures, and


comprises authentication, auditing, and logging services.
 Non-repudiation can be accomplished in a variety of methods, such as
the digital signing of log data as a checksum during collection or using
secured storage media.
In Data Audit Logs

 transmission by an attacker.
 Typically, a digital signature supplied in a hash algorithm is computed
against the log file at the time of collection.
 The output of this computation is a checksum that is used to verify that
the files have not been manipulated.
 If the file is updated in any manner, the hash generates a different value,
and the log file fails the integrity check.
 If the checksum is correct, the log is confirmed to be in its original state.
In Online Transactions

 In online transactions, Digital signatures guarantee that a party cannot


subsequently dispute delivering information or question the legitimacy of
its signature in online transactions.
 A digital signature is formed by pairing an encrypted key and a public key.
 Only the holder of the encrypted key has access to this key and can
generate this signature, confirming that that holder electronically signed a
document, which assures that a person cannot subsequently dispute
supplying the signature, hence ensuring non-repudiation.
In Cryptography
 Message authentication code (MAC), also called a tag in cryptography, is
used for authentication of messages or to certify that the message originated
from the specified sender and was not altered along the route.
 MAC values, unlike digital signatures, are created and confirmed using the
same private key, on which the sender and receiver must agree before
commencing interactions.
 A MAC can prevent message forging by anybody who does not have access
to the shared secret key, ensuring both integrity and authenticity.
 Non-repudiation cannot be provided by MAC methods such as block cipher-
based MAC (CMAC) and hash-based MAC (HMAC).
In Digital Contracts and Email

 A signatory of an email on one side of communication cannot deny


sending the message, and the receiver cannot deny receiving it.
 Email non-repudiation entails techniques such as email monitoring.
In E-commerce

 To aid in conflict resolutions of any kind, Non-repudiation is


implemented.
 It gives confirmation that a message was received and recognized by the
receiver.
 E-Commerce site security is crucial for a variety of reasons, including
protecting consumers' privacy and sensitive data on a website, securing
an online business's funds, and avoiding fraud and financial scams.
In Business-to-Business Transactions

 Non-repudiation is also used in B2B transactions.


 Non-repudiation allows your business to verify that it received or sent a
message from or to a trade partner if a trading partner repudiates the
transmission or receiving of messages or receipts.
 Non-repudiation entails two degrees of security, which are as follows
 Non-repudiation of received or sent communications - Both the transmitting and
receiving parties keep the message exchanged (the business document and any
attachments) in its original format.
 The transmitting message service handler (MSH) saves a message before sending it,
and the receiving MSH saves a message before processing it.
 Non-repudiation of receipts issued after a message is received - A receipt is sent by the
receiver of a message to acknowledge receipt of a message.
 You can exchange a signed receipt, which adds another layer of protection.
 Signed receipts allow you to confirm the legitimacy of the replying company or
individual as well as the content integrity.
 A Non-Repudiation-Information element is included in the receipt when
signed communications are exchanged with a trade partner.
 The non-repudiation element includes the message digest transmitted to the
trade partner.
 The sender compares the digest to the original message to verify that the
message content was not altered during transmission by an attacker.

You might also like