icon-1-darkicon-1-darkicon-1-lighticon-2-darkicon-2-lighticon-3-darkicon-3-lighticon-4-darkicon-4-lighticon-5-darkicon-5-lighticon-6-darkicon-6-lighticon-7-darkicon-7-lighticon-8-darkicon-8-lighticon-9-darkISOC-IconISOC-IconISOC-IconShapeISOC-IconISOC-IconISOC-IconPage 1icon-comma-darkicon-comma-lightFill 1ISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconShapeISOC-IconISOC-IconISOC-IconBLOCKSISOC-IconISOC-IconISOC-IconISOC-IconLISTISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconLEFTISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconShapeDOWN ARROWSEARCHISOC-IconISOC-IconISOC-IconISOC-IconISOC-IconISOC-Icon-Dark-RGBISOC-Society-logo

Time Security

Accurate time is essential for the trustworthiness of the Internet. Many general security mechanisms, such as the setup of encrypted channels and digital signature creation and verification, depend on accurate time information. Yet, time information on the Internet is not securely communicated because of flawed technical protocols, a dearth of available implementations and services, and insufficient deployment and operational practices.

As part of the Internet Society’s efforts to promote a trustworthy Internet, we will work with the communities of interest, including the open source community and network equipment vendors for the implementation of the network time security mechanisms and associated tools, network operators and enterprises, which will be needed to deploy the technology, the network time community that operates network time services, and operating system developers who incorporate core functionality in all computers and are a critical driver of deployment on the global Internet.

What Will This Project Address?

This project will stimulate the implementation of secure network time protocols, raise awareness to promote adoption, and build capacity to decrease the cost and risk of deployment. We will work with the relevant partner organizations and communities to evolve the time security specifications, encourage multiple interoperable implementations, and support the analysis of performance and security characteristics of these implementations. We will encourage the automated deployment and successful operation of time security mechanisms and best practices. Additionally, we will measure the state of deployment of time security to track its progress.

Our Work in 2020

In 2020:

  • The first implementations of network time security will be operationally deployed.
  • The initial materials to help others in their deployments will be available.
  • In addition, we will establish metrics and an associated measurement infrastructure to track future deployment.
  • Specific metrics will be developed during 2020 to set targets for significant deployment of time security on the Internet by 2025.