dcsimg

Find an IT Download

Digital Signature Standard (DSS)

Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. This Standard specifies a suite of algorithms that can be used to generate a digital signature.


816 KB | 3 files | null PDF

This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • DigitalSigStandard.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More