tailieunhanh - Digital signature standard (DSS)

This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory. | FIPS PUB 186-1 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION 1998 December 15 . DEPARTMENT OF COMMERCE National Institute of Standards and Technology DIGITAL SIGNATURE STANDARD DSS CATEGORY COMPUTER SECURITY . DEPARTMENT OF COMMERCE William M. Daley Secretary NATIONAL INSTITUTE OF STANDARDS AND technology Raymond G. Kammer Director Foreword The Federal Information Processing Standards Publication Series of the National Institute of Standards and Technology NIST is the official series of publications relating to standards and guidelines adopted and promulgated under the provisions of Section 5131 of the Information Technology Management Reform Act of 1996 Public Law 104-106 and the Computer Security Act of 1987 Public Law 100-235 . These mandates have given the Secretary of Commerce and NIST important responsibilities for improving the utilization and management of computer and related telecommunications systems in the Federal Government. The NIST through its Information Technology Laboratory provides leadership technical guidance and coordination of Government efforts in the development of standards and guidelines in these areas. Comments concerning Federal Information Processing Standards Publications are welcomed and should be addressed to the Director Information Technology Laboratory National Institute of Standards and Technology Gaithersburg MD 20899. Shukri Wakid Director Information Technology Laboratory Abstract This standard specifies a suite of algorithms which can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition the recipient of signed data can use a digital signature in proving to a third party that the signature was in fact generated by the signatory. This is known as nonrepudiation since the signatory cannot at a later time repudiate the signature. Key words ADP security computer security digital signatures .