As for non-denial , the difficult part is that it is not a technical, but rather a legal term, and this causes a lot of misunderstandings if they are placed in a technical context. The fact is that you can always give up anything . And that is why there are courts.
In court, two parties clash and try to prove each other incorrectly, using evidence . This is where the technology goes, because it allows you to collect enough electronic evidence to prove that the party who is trying to deny the transaction, message, etc., is mistaken.
And this is exactly what the ISO 13888 series does in part 1: it provides recommendations on what evidence to collect and how to protect it, to maximize your chances of resisting the rejection of electronic transactions. This standard talks about several tokens that serve this purpose. For example, these tokens: identifiers of both sides, timestamps, message hashes, etc. He then describes in detail how you should protect these tokens so that they retain their value as evidence.
The other two parts (2 and 3) describe specific cryptographic methods that can be used to obtain tokens. Symmetric - these are only hashes with keys, if I remember correctly (for example, HMAC), while asymmetric digital signature.
kravietz
source share