Digital Signature Standard (DSS)

Published: June 25, 2009

Author(s)

Elaine B. Barker

Abstract

[Superseded by FIPS 186-4(July 2013): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=914162] The Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time. This Standard specifies three techniques for the generation and verification of digital signatures: DSA, ECDSA and RSA. This revision increases the length of the keys allowed for DSA, provides additional requirements for the use of ECDSA and RSA, and includes requirements for obtaining assurances necessary for valid digital signatures. [Supersedes FIPS 186-2 (January 27, 2000): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917973]
Citation: Federal Inf. Process. Stds. (NIST FIPS) - 186-3
Report Number:
186-3
Pub Type: NIST Pubs

Supersedes

Superseded by

Keywords

computer security, cryptography, Digital Signature Algorithm, digital signatures, Elliptic Curve Digital Signature Algorithm, Federal Information Processing Standard, public key cryptography, RSA
Created June 25, 2009, Updated February 19, 2017