Security measures to establish the validity of a transmission, message, or originator

What is nonrepudiation?

Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information. It also cannot deny the authenticity of its signature on a document.

Although it originated as a legal concept, nonrepudiation is also widely used in computing, information security and communications.

Information assurance and nonrepudiation

Nonrepudiation is one of the five pillars of information assurance (IA), which is the practice of managing information-related risks and protecting information systems, like computers, servers and enterprise networks. The other four pillars are the following:

  1. integrity
  2. availability
  3. authentication
  4. confidentiality

Nonrepudiation provides proof of the origin, authenticity and integrity of data. It provides assurance to the sender that its message was delivered, as well as proof of the sender's identity to the recipient. This way, neither party can deny that a message was sent, received and processed.

Nonrepudiation is like authentication, particularly with respect to implementation. For instance, a public key signature can be a nonrepudiation device if only one party can produce signatures.

In general, nonrepudiation combines both authentication and integrity.

Security measures to establish the validity of a transmission, message, or originator
Nonrepudiation is one of the pillars of information assurance.

Nonrepudiation, message authentication code and digital signatures

Nonrepudiation is achieved through cryptography, like digital signatures, and includes other services for authentication, auditing and logging.

In online transactions, digital signatures ensure that a party cannot later deny sending information or deny the authenticity of its signature. A digital signature is created using the private key of an asymmetric key pair, which is public key cryptography, and verified with a corresponding public key.

Only the private key holder can access this key and create this signature, proving that a document was electronically signed by that holder. This ensures that a person cannot later deny that they furnished the signature, providing nonrepudiation.

In cryptography, a message authentication code (MAC), also known as a tag, is used to authenticate a message or confirm that the message came from the stated sender and was not changed along the way. Unlike digital signatures, MAC values are generated and verified using the same secret key, which the sender and recipient must agree on before initiating communications.

A MAC can protect against message forgery by anyone who doesn't know the shared secret key, providing both integrity and authentication. However, MAC algorithms, like cipher-based MAC and hash-based MAC, cannot provide nonrepudiation.

In addition to digital signatures, nonrepudiation is also used in digital contracts and email. Email nonrepudiation involves methods such as email tracking.

Drawbacks of nonrepudiation with digital signatures

Since no security technology is foolproof, some experts warn that a digital signature alone may not always guarantee nonrepudiation. Some suggest using multiple approaches to ensure nonrepudiation. One such practice is to capture biometric information and other data about the sender or signer that collectively would be difficult to repudiate.

It's also important to know that the current definitions of nonrepudiation in the digital space consider only the validity of the signature itself. They do not allow for the possibility that the signer was manipulated, forced or tricked into signing. It's also feasible that a virus, worm or other type of malware can compromise a sender's private key, possibly stealing or forging its digital signature and jeopardizing nonrepudiation.

Security measures to establish the validity of a transmission, message, or originator
Specific information about a sender or signer through biometrics strengthens the nonrepudiation process.

To avoid such issues and to ensure that a digital signature is valid -- and, therefore, the appropriate choice for nonrepudiation -- it must be established through a secure and fully trusted document handling and signature mechanism.

Another concern is the possibility that a digital signature remains the same, even if it's been faked by someone who has the private key. The U.S. Department of Defense addressed this problem with the common access card (CAC), a type of smart card for active duty defense personnel.

The CAC proves the holder's identity and enables physical access to controlled spaces and defense computer systems. It satisfies the requirements for digital signatures, as well as three IA pillars: nonrepudiation, integrity and authentication.

This was last updated in August 2021

Continue Reading About nonrepudiation

  • 8 electronic signature best practices to build in to your workflow
  • When should you use an electronic signature vs. digital signature?
  • Biometric security technology could see growth in 2021
  • Integrating security with robotic process automation
  • Cryptography basics: Symmetric key encryption algorithms

Dig Deeper on Identity and access management

  • Security measures to establish the validity of a transmission, message, or originator
    How DKIM records reduce email spoofing, phishing and spam

    Security measures to establish the validity of a transmission, message, or originator

    By: Peter Loshin

  • Security measures to establish the validity of a transmission, message, or originator
    Email authentication: How SPF, DKIM and DMARC work together

    Security measures to establish the validity of a transmission, message, or originator

    By: Peter Loshin

  • Security measures to establish the validity of a transmission, message, or originator
    DomainKeys Identified Mail (DKIM)

    Security measures to establish the validity of a transmission, message, or originator

    By: Peter Loshin

  • Security measures to establish the validity of a transmission, message, or originator
    Symmetric vs. asymmetric encryption: What's the difference?

    By: Michael Cobb

What are the measures to ensure security?

Here are some practical steps you can take today to tighten up your data security..
Back up your data. ... .
Use strong passwords. ... .
Take care when working remotely. ... .
Be wary of suspicious emails. ... .
Install anti-virus and malware protection. ... .
Don't leave paperwork or laptops unattended. ... .
Make sure your Wi-Fi is secure..

What are the three security measures used for information?

The principle of information security protection of confidentiality, integrity, and availability cannot be overemphasized: This is central to all studies and practices in IS. You'll often see the term CIA triad to illustrate the overall goals for IS throughout the research, guidance, and practices you encounter.

What are the 5 basic security principles?

The Principles of Security can be classified as follows:.
Confidentiality: The degree of confidentiality determines the secrecy of the information. ... .
Authentication: Authentication is the mechanism to identify the user or system or the entity. ... .
Integrity: ... .
Non-Repudiation: ... .
Access control: ... .
Availability:.

Is the Measure that protects and defends information and information systems by ensuring their availability integrity authentication confidentiality and non

Definition(s): Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.