Questions tagged [timestamp]

For questions relating to physical or digital timestamps, usually as part of a cryptographic protocol, logging, or auditing requirement. Please use the tag [time] for questions relating to system clocks.

Timestamps are used to denote the date and time at which an event occurred, typically as meta-data.

Their application to security ranges from modification times on files, to use of timestamps in cryptographic protocols to prevent replay attacks.

96 questions
0
votes
1 answer

Why AdES -A signatures require TWO timestamps?

Latest ETSI standard CAdES, XAdES and PAdES require for baseline profile LTA to fulfill previous LT, T and B levels. Summarizing,the conformance requirements are: B : Base signature with content-type, signing-time and signing-certificate T:…
0
votes
1 answer

Different Microsoft-signed excecutables have apparently the same signature!

On Windows 10 systems, I found two versions of bootsect.exe (a Microsoft-supplied utility that writes disk boot sector) with different hashes (SHA-1 9b7463c79460a55a36b53bee0889f894b2379ec3 for one 67ea7b4a6d73831600a141f053139b33fe90f1d8 for the…
fgrieu
  • 1,072
  • 7
  • 19
0
votes
5 answers

How to make sure nobody has read this!

Is there any computer/server which would allow me to get "guaranteed read access history" for files? For example, suppose I made a file with my plaintext passwords and simply wanted to make sure that those bits have not been read by anyone. In…
-1
votes
1 answer

Are there security implications to not installing the Leap Second patch on Red Hat systems?

What are Leap Seconds? A leap second is a second which is added to Coordinated Universal Time (UTC) in order to synchronize atomic clocks with astronomical time. The reason we have to add a second every now and then, is that Earth's rotation around…
Michael
  • 1,457
  • 1
  • 18
  • 36
-2
votes
1 answer

Prevent Replay attacks via timestamp while client clock is not adjusted

I'm going to send my timestamp to server and server will check if it is in a given interval. What if My mobile clock is not adjusted (say it gives 2:00 pm while now it is 2:00 am). now I lost the server. How should I handle such a situation.
-3
votes
1 answer

Authentication protocol based on hash function

Is it possible that Alice can authenticate Bob without using any secret information except her password, i.e they don't share any thing else. If so, how can I authenticate Alice and ensure the integrity and confidentiality of the password in the…
Sara
  • 1
  • 1
1 2 3 4 5 6
7