Talk:Trusted timestamping
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||
|
Timestamp
[edit]887d351edda1e99320469d62e22adc559a2bc4a2e4710ab440219c60cdc35601
b2e8d8c6e5cc4f3567bb64b203626c586978bf991ad24fd3d9165830ed4e3ef5
a20b004272a3630b11657474b0688153fc618173c277f8b35c640dcbf0efcab2
—Preceding unsigned comment added by 98.213.120.190 (talk) 06:07, 5 August 2009 (UTC)
Misleading: Example implementation is not RFC3161
[edit]I'm adding the misleading tag because of the implementation of a time-stamping protocol that is described in the "Creating a timestamp" and "Checking a timestamp" sections, as well as in the diagrams. Even though it would be a correct implementation, it is *not* RFC 3161 (by far the most widely used implementation of trusted time-stamping), or any existing implementation that I know of.
I think this is misleading as people could believe this is RFC 3161 and this could hinder their understanding of this standard. I suggest these paragraphs and diagrams be replaced by a similar description (in terms of language, scope and length) of RFC 3161. RFC 3161 is even simpler than this makeshift protocol. — Preceding unsigned comment added by 213.41.184.9 (talk) 17:31, 15 November 2011 (UTC)
The example in the 'History' paragraph
[edit]Hello, That's my very first post on Wikipedia. I've been reading carefully this article and other articles, related to security. What stucked me in the beginning is the example in the 'History' paragraph - the one that adresses research organizations. What I cannot understand is how storing the hash(the hash over the invention's data file) on paper helps ensure the "particular discovery" was made "on a particular date"?! As stated, it will prove that "the file retrieved from a backup tape has not been altered", but seems not to correlate to the goal of proving the invention origin and date! I've searched a little bit on the web, but couldn't find neighter a general explanation, nor a practical example of this kind of "semi-paper" patent protection. If someone can point us to a more sophisticated resources explaining this example, please contribute! --193.69.71.70 (talk) 13:08, 8 March 2012 (UTC)
- You're right, that part of the article is a little confusing. It is only possible to tie the date to the hash if the date is included in the contents that are hashed. For example, if you write a letter, you will usually write the date into the top right corner. A hash of the letter will include that date, and altering it will change the hash.
- However, the entire example seems a little strange, as the hash would need to be published outside the company to be trustworthy. A paper notebook, while harder to alter than a digital file, is by no means safe from manipulation. — DataWraith (talk) 10:18, 11 March 2012 (UTC)
I've searched again and I couldn't find anything like that. To me, it is incorrect. Seems like we'll have to read more on patent protection and provide a sophisticated example?! --77.77.163.1 (talk) 08:58, 12 March 2012 (UTC)
- Well, right now I think it'd be fine to just remove the example; it doesn't exactly fit the "History" title, and the text in the sections below makes it sufficiently clear what a trusted timestamp can be used for ("
It is used to prove the existence of certain data before a certain point (e.g. contracts, research data, medical records,...) without the possibility that the owner can backdate the timestamps.
") — DataWraith (talk) 21:35, 13 March 2012 (UTC)
Newspaper frontpage
[edit]In informal photographs, it is possible to assure a minimum date by including the frontpage of a newspaper in the picture, since the frontpage is difficult to to predict. It would be nice to integrate it in the article. Also, are there any similar non-cryptographic variants for a trusted timestamp? --83.76.138.77 (talk) 22:08, 4 June 2013 (UTC)
Newton's "anagram"
[edit]That is a remarkably modern-looking sort of code that Newton used and not an anagram. Is there any evidence that this was the string he used?--Jrm2007 (talk) 16:07, 25 December 2017 (UTC)
- Take a look at https://hsm.stackexchange.com/questions/679/what-ciphers-did-isaac-newton-use. in vivo veritas 00:04, 10 March 2019 (UTC) — Preceding unsigned comment added by In vivo veritas (talk • contribs)
- Start-Class Computer Security articles
- Unknown-importance Computer Security articles
- Start-Class Computer Security articles of Unknown-importance
- Start-Class Computing articles
- Unknown-importance Computing articles
- All Computing articles
- All Computer Security articles
- Start-Class Cryptography articles
- Unknown-importance Cryptography articles
- Start-Class Computer science articles
- Unknown-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles