Abstract
[Superseded by FIPS 186-2 (January 27, 2000):
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=] This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory. This is known as nonrepudiation since the signatory cannot, at a later time, repudiate the signature. [Supersedes FIPS 186 (May 19, 1994 w/ Change Notice 1 from 12/30/1996):
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917975]