non-repudiation


Also found in: Dictionary, Thesaurus, Legal, Wikipedia.

non-repudiation

To be unable to reject the validity of a document (unable to prove it is counterfeit). The term is the opposite of "repudiate," which means to reject the validity of something.

Digital signatures and certificates provide non-repudiation because they guarantee the authenticity of a document or message. As a result, the sending parties cannot deny that they sent it (they cannot repudiate it). Non-repudiation can also be used to ensure that an email message was opened (see email tracker).
References in periodicals archive ?
The second step of the algorithm is signing the message using sender's private key to provide message authentication, message integrity, and message non-repudiation. The vehicle proves that it creates the message and cannot deny that since it uses its private key, and the integrity proves because the digital signature will be different at the receiver side if the message is altered.
However, Yang and Yu [24] prove that Wang and Wang's scheme fails to provide the security properties like unforgeability, non-repudiation and unlinkability.
A new email exploit, dubbed ROPEMAKER by Mimecast's research team, turns that assumption on its head, undermining the security and non-repudiation of email; even for those that use SMIME or PGP for signing." Gardiner explains that the origin of ROPEMAKER lies at the intersection of email and Web technologies, more specifically Cascading Style Sheets (CSS) used with HTML.
Since the DSA came into effect, doctrine has developed the theory of "non-repudiation:"
In the communication path there is a problem of non-repudiation, hacking the system.
However, for internet and web related applications, major security objectives include non-repudiation, man-in-the-middle and reply attack.
However, in the following, we address the main security requirements related to VANETs which are: authentication, availability, integrity, non-repudiation and privacy, these requirements can be thought as criteria to measure the network security.
IPC is working with Post-Quantum to enable user authentication, non-repudiation and fraud deterrence technologies into IPC solutions delivered over Connexus Cloud.
Syngrafii delivers original one time use wet signatures in both LongPen and Digital Paper along with a detailed audit history for security, compliance and non-repudiation.
This is more important for electronic signatures than wet-ink signatures because, like origin, authenticity and non-repudiation, the act of signing a document has become an implicit expression of intentionality.
Most network security professionals would not consider it an overstatement to say that our ability to successfully perform security services, such as confidentiality, integrity authentication, source authentication and authorization, and non-repudiation, are directly dependent on the unfailing cryptographic properties of the employed SHA standard--which in this case is SHA-256.
Unfortunately, this dependence can place the organization's mission at risk when an information incident (e.g., the loss or degradation of the confidentiality, integrity, availability, non-repudiation, or authenticity of a critical information resource or flow) occurs .