• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

FIPS PUB 186 : 0

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

DIGITAL SIGNATURE STANDARD (DSS)

Withdrawn date

05-07-2023

Sorry this product is not available in your region.

1. INTRODUCTION
2. GENERAL
3. USE OF THE DSA ALGORITHM
4. DSA PARAMETERS
5. SIGNATURE GENERATION
6. SIGNATURE VERIFICATION
APPENDIX 1. A PROOF THAT [NU] = r'
APPENDIX 2. GENERATION OF PRIMES FOR THE DSA
APPENDIX 3. RANDOM NUMBER GENERATION FOR THE DSA
APPENDIX 4. GENERATION OF OTHERS QUANTITIES
APPENDIX 5. EXAMPLE OF THE DSA

Specifies a Digital Signature Algorithm (DSA) appropriate for applications requiring a digital, rather than written, signature.

Committee
AREA IPSC
DocumentType
Standard
PublisherName
US Military Specs/Standards/Handbooks
Status
Withdrawn

MIL-STD-1840 Revision C:1997 AUTOMATED INTERCHANGE OF TECHNICAL INFORMATION
PD IEC/PAS 62734:2012 Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications
ISO/IEC 13157-2:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES
16/30339535 DC : 0 BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER
BS ISO/IEC 19770-3:2016 Information technology. IT asset management Entitlement schema
PD IEC/TS 60870-5-7:2013 Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351)
IEEE 1363.3-2013 IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
IEEE 1363.2 : 2008 SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES
I.S. EN 62056-5-3:2017 ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
PREN 419212-5 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
ISO/IEC 19770-3:2016 Information technology IT asset management Part 3: Entitlement schema
ASTM E 1762 : 1995 Standard Guide for Electronic Authentication of Health Care Information
ISO/IEC TR 29149:2012 Information technology Security techniques Best practices for the provision and use of time-stamping services
ASTM E 2085 : 2000 : REV A Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009)
CEN/TS 15130:2006 Postal services - DPM infrastructure - Messages supporting DPM applications
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
EN 62056-5-3:2017 Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer
ISO/IEC 18013-3:2017 Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation
10/30192164 DC : DRAFT JUNE 2010 BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION
DD CEN/TS 15130:2006 Postal services. DPM infrastructure. Messages supporting DPM applications
PREN 14890-1 : DRAFT 2012 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
16/30335567 DC : 0 BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION
BS EN 62056-5-3:2017 Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer
CAN/CSA-ISO/IEC 19678:16 Information Technology BIOS Protection Guidelines (Adopted ISO/IEC 19678:2015, first edition, 2015-05-01)
ANSI INCITS 516 : 2013(R2018) INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4)
16/30335156 DC : 0 BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
CEI UNI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
SCTE 41 : 2016 POD COPY PROTECTION SYSTEM
BS ISO/IEC 19770-2:2015 Information technology. Software asset management Software identification tag
TS 101 733 : 2.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES)
PD IEC/TS 62224:2013 Multimedia home server systems. Conceptual model for digital rights management
PD ISO/TR 14742:2010 Financial services. Recommendations on cryptographic algorithms and their use
BS ISO/IEC 18367:2016 Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing
ISO 20215:2015 Space data and information transfer systems — CCSDS cryptographic algorithms
BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
BS ISO/IEC 18013-3:2017 Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation
ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
ARINC 823-1 : 2007 DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY
ISO/IEC 11889-1:2015 Information technology — Trusted platform module library — Part 1: Architecture
ISO/IEC 18367:2016 Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing
ISO/IEC/IEEE 8802-22:2015 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands
CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
BS ISO/IEC/IEEE 8802-22:2015 Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands
ISO/IEC 29167-17:2015 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications
15/30228996 DC : 0 BS ISO/IEC 19770-3 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 3: SOFTWARE ENTITLEMENT SCHEMA
SMPTE ST 429.6 : 2006 AMD 1 2018 D-CINEMA PACKAGING - MXF TRACK FILE ESSENCE ENCRYPTION
UNI CEI ISO/IEC 18013-3 : 2011 INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION
BS ISO 20215:2015 Space data and information transfer systems. CCSDS cryptographic algorithms
PD CEN/TS 16702-1:2014 Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking
14/30302807 DC : 0 BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES
BS ISO/IEC 14888-3 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
TS 103 436 : 1.2.1 RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY REQUIREMENTS FOR RECONFIGURABLE RADIOS
12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
14/30297103 DC : 0 BS ISO/IEC 19678 - INFORMATION TECHNOLOGY - BIOS PROTECTIONS
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
ISO/IEC/IEEE 8802-15-6:2017 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network
MIL-STD-2045-47001 Revision D:2005 CONNECTIONLESS DATA TRANSFER APPLICATION LAYER STANDARD
BIS IS/IEC/TS 62351-5 : 2009(R2016) POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
ISO/IEC/IEEE 8802-21:2018 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 21: Media independent services framework
S.R. CWA 16745:2014 IMPROVING TRANSPARENCY IN FINANCIAL AND BUSINESS REPORTING - METADATA CONTAINER
S.R. CEN/TS 16702-1:2014 ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING
ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
ISO/TR 14742:2010 Financial services Recommendations on cryptographic algorithms and their use
ISO/IEC 15444-2:2004 Information technology JPEG 2000 image coding system: Extensions Part 2:
IEC 62056-5-3:2017 Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer
TR 103 690 : 1.1.1 LAWFUL INTERCEPTION (LI); EWARRANT INTERFACE
GS NFV-SEC 002 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); NFV SECURITY; CATALOGUING SECURITY FEATURES IN MANAGEMENT SOFTWARE
CAN/CSA-ISO/IEC 29167-17:16 Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01)
ISO/IEC 29167-12:2015 Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communications
TS 102 176-1 : 2.1.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS
ISO/IEC 19678:2015 Information Technology BIOS Protection Guidelines
14/30284313 DC : 0 BS ISO 32000-2 - DOCUMENT MANAGEMENT - PORTABLE DOCUMENT FORMAT - PART 2: PDF 2.0
TS 102 232 : 1.5.1 LAWFUL INTERCEPTION (LI); HANDOVER SPECIFICATION FOR IP DELIVERY
TR 101 545-4 : 1.1.1 DIGITAL VIDEO BROADCASTING (DVB); SECOND GENERATION DVB INTERACTIVE SATELLITE SYSTEM (DVB-RCS2); PART 4: GUIDELINES FOR IMPLEMENTATION AND USE OF EN 301 545-2
CAN/CSA-ISO/IEC/IEEE 8802-22:16 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01)
BS ISO/IEC 15946-5:2017 Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation
TS 101 861 : 1.4.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE
ANSI X9.112-2 : 2014 WIRELESS MANAGEMENT AND SECURITY - PART 2: ATM AND POS
TS 102 220 : 1.1.1 ACCESS AND TERMINALS (AT); TECHNICAL SPECIFICATION: DELIVERY OF CABLE BASED SERVICES ACROSS A HOME ACCESS TO THE DEVICES IN THE HOME
DD IEC TS 62351-5 : DRAFT OCT 2009 POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES
CAN/CSA-ISO/IEC 29167-12:16 Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15)
PREN 14615 : DRAFT 2016 POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN
UNE-ETSI/TS 101733 V1.2.2:2011 Electronic signature formats.
DD IEC/TS 62351-2:2008 Power systems management and associated information exchange. Data and communications security Glossary of terms
IEEE DRAFT 1609.2 : 0 WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS - SECURITY SERVICES FOR APPLICATIONS AND MANAGEMENT MESSAGES
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
ASTM E 1762 : 1995 : R2009 Standard Guide for Electronic Authentication of Health Care Information
SCTE 23-2 : 2017 DOCSIS 1.1 - PART 2: BASELINE PRIVACY PLUS INTERFACE
SCTE 24-10 : 2016 IPCABLECOM 1.0 - PART 10: SECURITY SPECIFICATION
ASTM E 1762 : 1995 : R2013 Standard Guide for Electronic Authentication of Health Care Information (Withdrawn 2017)
I.S. CEN TS 15130:2006 POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 14776-333:2013 Information technology Small Computer System Interface (SCSI) Part 333: SCSI Stream Commands - 3 (SSC-3)
ISO 26429-6:2008 Digital cinema (D-cinema) packaging — Part 6: MXF track file essence encryption
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
IEC TS 62351-2:2008 Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms
IEC PAS 62734:2012 Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications
IEC TS 62224:2013 Multimedia home server systems - Conceptual model for digital rights management
IEC 62351-11:2016 Power systems management and associated information exchange - Data and communications security - Part 11: Security for XML documents
BS ISO/IEC 19678:2015 Information Technology. BIOS Protection Guidelines
UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
ISO/IEC 19770-2:2015 Information technology IT asset management Part 2: Software identification tag
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
BS EN 62351-11:2017 Power systems management and associated information exchange. Data and communications security Security for XML documents
BS ISO/IEC 24713-3:2009 Information technology. Biometric profiles for interoperability and data interchange Biometrics-based verification and identification of seafarers
BS ISO/IEC/IEEE 8802-1AR:2014 Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks Secure device identity
PD ISO/IEC TR 29149:2012 Information technology. Security techniques. Best practices for the provision and use of time-stamping services
15/30268565 DC : 0 BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS
ES 202 488-3 : 1.1.1 ACCESS AND TERMINALS (AT); SECOND GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES - IP CABLE MODEMS; PART 3: BASELINE PRIVACY PLUS INTERFACE SPECIFICATION
BS ISO 26429-6:2008 Digital cinema (D-cinema) packaging MXF track file essence encryption
DD IEC TS 62224 : DRAFT 2007 MULTIMEDIA HOME SERVER SYSTEMS - CONCEPTUAL MODEL FOR DIGITAL RIGHTS MANAGEMENT
BS ISO/IEC/IEEE 8802-21:2018 Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Media independent services framework
ANSI X9.82-3 : 2007(R2017) RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS
ISO/IEC/IEEE 8802-1AR:2014 Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Part 1AR: Secure device identity
ISO/IEC 20248:2018 Information technology Automatic identification and data capture techniques Data structures Digital signature meta structure
ASTM E 1762 : 1995 : R2003 Standard Guide for Electronic Authentication of Health Care Information
IEEE 1815-2012 REDLINE IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3)
IEEE 802.22-2011 IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands
ISO/IEC 24713-3:2009 Information technology Biometric profiles for interoperability and data interchange Part 3: Biometrics-based verification and identification of seafarers
ISO/IEC 13157-3:2016 Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
16/30345819 DC : 0 BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE
EN 62351-11:2017 Power systems management and associated information exchange – Data and communications security - Part 11: Security for XML documents
CAN/CSA-ISO/IEC 18367:18 Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.