SlideShare a Scribd company logo
1 of 6
NON REPUDIATION
๏‚– Non-repudiation is the assurance that someone cannot deny the
validity of something. Non-repudiation is a legal concept that is
widely used in information security and refers to a service, which
provides proof of the origin of data and the integrity of the data. In
other words, non-repudiation makes it very difficult to successfully
deny who/where a message came from as well as the authenticity
and integrity of that message.
NON-
REPUDIATION
PRINCIPLES
Non-repudiation requires the creation of artifacts which may be
used to dispute the claims of an entity or organization that denies
being the originator of an action or communication.These artifacts
consist of:
๏‚– An identity
๏‚– The authentication of that identity
๏‚– Tangible evidence connecting the identified party to a particular
communication or action
REPUDIATION
ATTACK
๏‚– When a system or application doesnโ€™t include protocols or controls
for tracking and logging the actions of its users, the system may
be manipulated by malicious intruders, who can forge the
identifying credentials of new actions, which canโ€™t be denied with
certainty.
๏‚– In a repudiation attack of this type, erroneous data may be fed
into log files, the authoring information of actions on the system
may be altered, and general data manipulation or spoofing may
occur.
DIGITAL
SIGNATURES
๏‚– A digital signature is used to introduce the qualities of uniqueness
and non-deniability to internet communications. Each certificate
is digitally signed by a trusted Certificate Authority or CA, and its
hash value is encrypted with a private key also held by that same
trusted CA.
๏‚– The sender of a message can use a private key to encrypt the hash
of the document โ€“ giving its digital signature, which is attached to
the document as itโ€™s sent. At the other end, the recipient may
decrypt the digital signature using a public key. By calculating the
hash value of the document and comparing it with the documentโ€™s
decrypted digital signature (which is also the hash value of the
document), the two may be compared to confirm that they
match.
๏‚– With this match established, the recipient is able to confirm who
the sender of the message actually is, and which particular
message was actually sent. Digital signatures ensure that a
document or message has actually been signed by the person who
claims to have signed it. In addition, a digital signature can only be
created by one person โ€“ so that person canโ€™t later deny having
been the originator of the transmission.

More Related Content

What's hot

Data integrity
Data integrityData integrity
Data integrity
Rahul Gupta
ย 
9. Object Relational Databases in DBMS
9. Object Relational Databases in DBMS9. Object Relational Databases in DBMS
9. Object Relational Databases in DBMS
koolkampus
ย 
What is malware
What is malwareWhat is malware
What is malware
Malcolm York
ย 

What's hot (20)

Network Security
Network SecurityNetwork Security
Network Security
ย 
Data integrity
Data integrityData integrity
Data integrity
ย 
Malware
MalwareMalware
Malware
ย 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
ย 
9. Object Relational Databases in DBMS
9. Object Relational Databases in DBMS9. Object Relational Databases in DBMS
9. Object Relational Databases in DBMS
ย 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
ย 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
ย 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
ย 
DBMS Keys
DBMS KeysDBMS Keys
DBMS Keys
ย 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
ย 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
ย 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
ย 
What is malware
What is malwareWhat is malware
What is malware
ย 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
ย 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
ย 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
ย 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
ย 
Database Security
Database SecurityDatabase Security
Database Security
ย 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
ย 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
ย 

Similar to Non repudiation

Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
Mohammad Yasar
ย 
Digital signature
Digital signatureDigital signature
Digital signature
gajerachetan
ย 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
ManuE45
ย 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
MuthuvasanSR
ย 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
Tania Fuchs
ย 

Similar to Non repudiation (20)

Digital_signature_ppt.pptx
Digital_signature_ppt.pptxDigital_signature_ppt.pptx
Digital_signature_ppt.pptx
ย 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
ย 
Digital signature
Digital signatureDigital signature
Digital signature
ย 
digital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptxdigital-signature-8736-rPgxHVG.pptx
digital-signature-8736-rPgxHVG.pptx
ย 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
ย 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
ย 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
ย 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
ย 
Difference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital CertificateDifference Between Digital Signature vs Digital Certificate
Difference Between Digital Signature vs Digital Certificate
ย 
PKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by ExelaPKI - The Backbone of Digital Signatures - DrySign by Exela
PKI - The Backbone of Digital Signatures - DrySign by Exela
ย 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ย 
Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun Digital Signatures- Learning The Process With Fun
Digital Signatures- Learning The Process With Fun
ย 
Ds over
Ds overDs over
Ds over
ย 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
ย 
Protection on cyber fraud
Protection on cyber fraudProtection on cyber fraud
Protection on cyber fraud
ย 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
ย 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
ย 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
ย 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
ย 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
ย 

More from Jasleen Khalsa (9)

Authorization
AuthorizationAuthorization
Authorization
ย 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
ย 
Encryption
EncryptionEncryption
Encryption
ย 
Integrity
IntegrityIntegrity
Integrity
ย 
Trust dimension in m-commerce
Trust dimension in m-commerceTrust dimension in m-commerce
Trust dimension in m-commerce
ย 
Privacy concerns in m commerce
Privacy concerns in m commercePrivacy concerns in m commerce
Privacy concerns in m commerce
ย 
Location tracking technologies
Location tracking technologiesLocation tracking technologies
Location tracking technologies
ย 
Recaliberating early expectations in m-commerce
Recaliberating early expectations in m-commerceRecaliberating early expectations in m-commerce
Recaliberating early expectations in m-commerce
ย 
M commerce issues
M commerce issuesM commerce issues
M commerce issues
ย 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 

Recently uploaded (20)

Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
ย 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
ย 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
ย 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 

Non repudiation

  • 2. ๏‚– Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data. In other words, non-repudiation makes it very difficult to successfully deny who/where a message came from as well as the authenticity and integrity of that message.
  • 3. NON- REPUDIATION PRINCIPLES Non-repudiation requires the creation of artifacts which may be used to dispute the claims of an entity or organization that denies being the originator of an action or communication.These artifacts consist of: ๏‚– An identity ๏‚– The authentication of that identity ๏‚– Tangible evidence connecting the identified party to a particular communication or action
  • 4. REPUDIATION ATTACK ๏‚– When a system or application doesnโ€™t include protocols or controls for tracking and logging the actions of its users, the system may be manipulated by malicious intruders, who can forge the identifying credentials of new actions, which canโ€™t be denied with certainty. ๏‚– In a repudiation attack of this type, erroneous data may be fed into log files, the authoring information of actions on the system may be altered, and general data manipulation or spoofing may occur.
  • 5. DIGITAL SIGNATURES ๏‚– A digital signature is used to introduce the qualities of uniqueness and non-deniability to internet communications. Each certificate is digitally signed by a trusted Certificate Authority or CA, and its hash value is encrypted with a private key also held by that same trusted CA. ๏‚– The sender of a message can use a private key to encrypt the hash of the document โ€“ giving its digital signature, which is attached to the document as itโ€™s sent. At the other end, the recipient may decrypt the digital signature using a public key. By calculating the hash value of the document and comparing it with the documentโ€™s decrypted digital signature (which is also the hash value of the document), the two may be compared to confirm that they match.
  • 6. ๏‚– With this match established, the recipient is able to confirm who the sender of the message actually is, and which particular message was actually sent. Digital signatures ensure that a document or message has actually been signed by the person who claims to have signed it. In addition, a digital signature can only be created by one person โ€“ so that person canโ€™t later deny having been the originator of the transmission.