Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker;|
|Title:||Digital Signature Standard (DSS)|
|Published:||June 25, 2009|
|Abstract:||[Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time. This Standard specifies three techniques for the generation and verification of digital signatures: DSA, ECDSA and RSA. This revision increases the length of the keys allowed for DSA, provides additional requirements for the use of ECDSA and RSA, and includes requirements for obtaining assurances necessary for valid digital signatures. [Supersedes FIPS 186-2 (January 27, 2000): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917973]|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 186-3|
|Keywords:||computer security, cryptography, Digital Signature Algorithm, digital signatures, Elliptic Curve Digital Signature Algorithm, Federal Information Processing Standard, public key cryptography, RSA|
|Research Areas:||Information Technology, Computer Security, Cybersecurity|