Talk:Trusted timestamping

Latest comment: 6 years ago by Jrm2007 in topic Newton's "anagram"

Timestamp edit

887d351edda1e99320469d62e22adc559a2bc4a2e4710ab440219c60cdc35601
b2e8d8c6e5cc4f3567bb64b203626c586978bf991ad24fd3d9165830ed4e3ef5
a20b004272a3630b11657474b0688153fc618173c277f8b35c640dcbf0efcab2
—Preceding unsigned comment added by 98.213.120.190 (talk) 06:07, 5 August 2009 (UTC)Reply

Misleading: Example implementation is not RFC3161 edit

I'm adding the misleading tag because of the implementation of a time-stamping protocol that is described in the "Creating a timestamp" and "Checking a timestamp" sections, as well as in the diagrams. Even though it would be a correct implementation, it is *not* RFC 3161 (by far the most widely used implementation of trusted time-stamping), or any existing implementation that I know of.

I think this is misleading as people could believe this is RFC 3161 and this could hinder their understanding of this standard. I suggest these paragraphs and diagrams be replaced by a similar description (in terms of language, scope and length) of RFC 3161. RFC 3161 is even simpler than this makeshift protocol. — Preceding unsigned comment added by 213.41.184.9 (talk) 17:31, 15 November 2011 (UTC)Reply

The example in the 'History' paragraph edit

Hello, That's my very first post on Wikipedia. I've been reading carefully this article and other articles, related to security. What stucked me in the beginning is the example in the 'History' paragraph - the one that adresses research organizations. What I cannot understand is how storing the hash(the hash over the invention's data file) on paper helps ensure the "particular discovery" was made "on a particular date"?! As stated, it will prove that "the file retrieved from a backup tape has not been altered", but seems not to correlate to the goal of proving the invention origin and date! I've searched a little bit on the web, but couldn't find neighter a general explanation, nor a practical example of this kind of "semi-paper" patent protection. If someone can point us to a more sophisticated resources explaining this example, please contribute! --193.69.71.70 (talk) 13:08, 8 March 2012 (UTC)Reply

You're right, that part of the article is a little confusing. It is only possible to tie the date to the hash if the date is included in the contents that are hashed. For example, if you write a letter, you will usually write the date into the top right corner. A hash of the letter will include that date, and altering it will change the hash.
However, the entire example seems a little strange, as the hash would need to be published outside the company to be trustworthy. A paper notebook, while harder to alter than a digital file, is by no means safe from manipulation. — DataWraith (talk) 10:18, 11 March 2012 (UTC)Reply

I've searched again and I couldn't find anything like that. To me, it is incorrect. Seems like we'll have to read more on patent protection and provide a sophisticated example?! --77.77.163.1 (talk) 08:58, 12 March 2012 (UTC)Reply

Well, right now I think it'd be fine to just remove the example; it doesn't exactly fit the "History" title, and the text in the sections below makes it sufficiently clear what a trusted timestamp can be used for ("It is used to prove the existence of certain data before a certain point (e.g. contracts, research data, medical records,...) without the possibility that the owner can backdate the timestamps.") — DataWraith (talk) 21:35, 13 March 2012 (UTC)Reply

Newspaper frontpage edit

In informal photographs, it is possible to assure a minimum date by including the frontpage of a newspaper in the picture, since the frontpage is difficult to to predict. It would be nice to integrate it in the article. Also, are there any similar non-cryptographic variants for a trusted timestamp? --83.76.138.77 (talk) 22:08, 4 June 2013 (UTC)Reply

Newton's "anagram" edit

That is a remarkably modern-looking sort of code that Newton used and not an anagram. Is there any evidence that this was the string he used?--Jrm2007 (talk) 16:07, 25 December 2017 (UTC)Reply

Take a look at https://hsm.stackexchange.com/questions/679/what-ciphers-did-isaac-newton-use. in vivo veritas 00:04, 10 March 2019 (UTC) — Preceding unsigned comment added by In vivo veritas (talkcontribs)