Abstract
[Superseded by FIPS 186-3 (June 2009):
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=902984] This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory. This is known as nonrepudiation since the signatory cannot, at a later time, repudiate the signature. [Supersedes FIPS 186-1 (December 15, 1998):
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917974]