FIPS PUB 186 : 0
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
DIGITAL SIGNATURE STANDARD (DSS)
05-07-2023
1. INTRODUCTION
2. GENERAL
3. USE OF THE DSA ALGORITHM
4. DSA PARAMETERS
5. SIGNATURE GENERATION
6. SIGNATURE VERIFICATION
APPENDIX 1. A PROOF THAT [NU] = r'
APPENDIX 2. GENERATION OF PRIMES FOR THE DSA
APPENDIX 3. RANDOM NUMBER GENERATION FOR THE DSA
APPENDIX 4. GENERATION OF OTHERS QUANTITIES
APPENDIX 5. EXAMPLE OF THE DSA
Specifies a Digital Signature Algorithm (DSA) appropriate for applications requiring a digital, rather than written, signature.
Committee |
AREA IPSC
|
DocumentType |
Standard
|
PublisherName |
US Military Specs/Standards/Handbooks
|
Status |
Withdrawn
|
MIL-STD-1840 Revision C:1997 | AUTOMATED INTERCHANGE OF TECHNICAL INFORMATION |
PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
16/30339535 DC : 0 | BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
BS ISO/IEC 19770-3:2016 | Information technology. IT asset management Entitlement schema |
PD IEC/TS 60870-5-7:2013 | Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351) |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
IEEE 1363.2 : 2008 | SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
I.S. EN 62056-5-3:2017 | ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
PREN 419212-5 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
ISO/IEC 19770-3:2016 | Information technology IT asset management Part 3: Entitlement schema |
ASTM E 1762 : 1995 | Standard Guide for Electronic Authentication of Health Care Information |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
ASTM E 2085 : 2000 : REV A | Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009) |
CEN/TS 15130:2006 | Postal services - DPM infrastructure - Messages supporting DPM applications |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62056-5-3:2017 | Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
ISO/IEC 18013-3:2017 | Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
DD CEN/TS 15130:2006 | Postal services. DPM infrastructure. Messages supporting DPM applications |
PREN 14890-1 : DRAFT 2012 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30335567 DC : 0 | BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
BS EN 62056-5-3:2017 | Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
CAN/CSA-ISO/IEC 19678:16 | Information Technology BIOS Protection Guidelines (Adopted ISO/IEC 19678:2015, first edition, 2015-05-01) |
ANSI INCITS 516 : 2013(R2018) | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
16/30335156 DC : 0 | BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
CEI UNI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
SCTE 41 : 2016 | POD COPY PROTECTION SYSTEM |
BS ISO/IEC 19770-2:2015 | Information technology. Software asset management Software identification tag |
TS 101 733 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES) |
PD IEC/TS 62224:2013 | Multimedia home server systems. Conceptual model for digital rights management |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO 20215:2015 | Space data and information transfer systems — CCSDS cryptographic algorithms |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 18013-3:2017 | Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
ISO/IEC 18370-2:2016 | Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ARINC 823-1 : 2007 | DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
ISO/IEC 18367:2016 | Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC/IEEE 8802-22:2015 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
BS ISO/IEC/IEEE 8802-22:2015 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
15/30228996 DC : 0 | BS ISO/IEC 19770-3 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 3: SOFTWARE ENTITLEMENT SCHEMA |
SMPTE ST 429.6 : 2006 AMD 1 2018 | D-CINEMA PACKAGING - MXF TRACK FILE ESSENCE ENCRYPTION |
UNI CEI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
BS ISO 20215:2015 | Space data and information transfer systems. CCSDS cryptographic algorithms |
PD CEN/TS 16702-1:2014 | Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
BS ISO/IEC 14888-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
TS 103 436 : 1.2.1 | RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY REQUIREMENTS FOR RECONFIGURABLE RADIOS |
12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
14/30297103 DC : 0 | BS ISO/IEC 19678 - INFORMATION TECHNOLOGY - BIOS PROTECTIONS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ISO/IEC/IEEE 8802-15-6:2017 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
MIL-STD-2045-47001 Revision D:2005 | CONNECTIONLESS DATA TRANSFER APPLICATION LAYER STANDARD |
BIS IS/IEC/TS 62351-5 : 2009(R2016) | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
ISO/IEC/IEEE 8802-21:2018 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 21: Media independent services framework |
S.R. CWA 16745:2014 | IMPROVING TRANSPARENCY IN FINANCIAL AND BUSINESS REPORTING - METADATA CONTAINER |
S.R. CEN/TS 16702-1:2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 15444-2:2004 | Information technology JPEG 2000 image coding system: Extensions Part 2: |
IEC 62056-5-3:2017 | Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
TR 103 690 : 1.1.1 | LAWFUL INTERCEPTION (LI); EWARRANT INTERFACE |
GS NFV-SEC 002 : 1.1.1 | NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; CATALOGUING SECURITY FEATURES IN MANAGEMENT SOFTWARE |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 29167-12:2015 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications |
TS 102 176-1 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS |
ISO/IEC 19678:2015 | Information Technology BIOS Protection Guidelines |
14/30284313 DC : 0 | BS ISO 32000-2 - DOCUMENT MANAGEMENT - PORTABLE DOCUMENT FORMAT - PART 2: PDF 2.0 |
TS 102 232 : 1.5.1 | LAWFUL INTERCEPTION (LI); HANDOVER SPECIFICATION FOR IP DELIVERY |
TR 101 545-4 : 1.1.1 | DIGITAL VIDEO BROADCASTING (DVB); SECOND GENERATION DVB INTERACTIVE SATELLITE SYSTEM (DVB-RCS2); PART 4: GUIDELINES FOR IMPLEMENTATION AND USE OF EN 301 545-2 |
CAN/CSA-ISO/IEC/IEEE 8802-22:16 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01) |
BS ISO/IEC 15946-5:2017 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
TS 101 861 : 1.4.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE |
ANSI X9.112-2 : 2014 | WIRELESS MANAGEMENT AND SECURITY - PART 2: ATM AND POS |
TS 102 220 : 1.1.1 | ACCESS AND TERMINALS (AT); TECHNICAL SPECIFICATION: DELIVERY OF CABLE BASED SERVICES ACROSS A HOME ACCESS TO THE DEVICES IN THE HOME |
DD IEC TS 62351-5 : DRAFT OCT 2009 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
CAN/CSA-ISO/IEC 29167-12:16 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
PREN 14615 : DRAFT 2016 | POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
IEEE DRAFT 1609.2 : 0 | WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS - SECURITY SERVICES FOR APPLICATIONS AND MANAGEMENT MESSAGES |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
ASTM E 1762 : 1995 : R2009 | Standard Guide for Electronic Authentication of Health Care Information |
SCTE 23-2 : 2017 | DOCSIS 1.1 - PART 2: BASELINE PRIVACY PLUS INTERFACE |
SCTE 24-10 : 2016 | IPCABLECOM 1.0 - PART 10: SECURITY SPECIFICATION |
ASTM E 1762 : 1995 : R2013 | Standard Guide for Electronic Authentication of Health Care Information (Withdrawn 2017) |
I.S. CEN TS 15130:2006 | POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 14776-333:2013 | Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3) |
ISO 26429-6:2008 | Digital cinema (D-cinema) packaging — Part 6: MXF track file essence encryption |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
IEC TS 62224:2013 | Multimedia home server systems - Conceptual model for digital rights management |
IEC 62351-11:2016 | Power systems management and associated information exchange - Data and communications security - Part 11: Security for XML documents |
BS ISO/IEC 19678:2015 | Information Technology. BIOS Protection Guidelines |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 19770-2:2015 | Information technology IT asset management Part 2: Software identification tag |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS EN 62351-11:2017 | Power systems management and associated information exchange. Data and communications security Security for XML documents |
BS ISO/IEC 24713-3:2009 | Information technology. Biometric profiles for interoperability and data interchange Biometrics-based verification and identification of seafarers |
BS ISO/IEC/IEEE 8802-1AR:2014 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks Secure device identity |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
15/30268565 DC : 0 | BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
ES 202 488-3 : 1.1.1 | ACCESS AND TERMINALS (AT); SECOND GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES - IP CABLE MODEMS; PART 3: BASELINE PRIVACY PLUS INTERFACE SPECIFICATION |
BS ISO 26429-6:2008 | Digital cinema (D-cinema) packaging MXF track file essence encryption |
DD IEC TS 62224 : DRAFT 2007 | MULTIMEDIA HOME SERVER SYSTEMS - CONCEPTUAL MODEL FOR DIGITAL RIGHTS MANAGEMENT |
BS ISO/IEC/IEEE 8802-21:2018 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Media independent services framework |
ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
ISO/IEC/IEEE 8802-1AR:2014 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 1AR: Secure device identity |
ISO/IEC 20248:2018 | Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure |
ASTM E 1762 : 1995 : R2003 | Standard Guide for Electronic Authentication of Health Care Information |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
IEEE 802.22-2011 | IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
ISO/IEC 24713-3:2009 | Information technology Biometric profiles for interoperability and data interchange Part 3: Biometrics-based verification and identification of seafarers |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
16/30345819 DC : 0 | BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
EN 62351-11:2017 | Power systems management and associated information exchange – Data and communications security - Part 11: Security for XML documents |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.