AIR FORCE FIPS PUB 186-3 CHG NOTICE 1-2009 Digital Signature Standard (DSS).pdf
《AIR FORCE FIPS PUB 186-3 CHG NOTICE 1-2009 Digital Signature Standard (DSS).pdf》由会员分享,可在线阅读,更多相关《AIR FORCE FIPS PUB 186-3 CHG NOTICE 1-2009 Digital Signature Standard (DSS).pdf(130页珍藏版)》请在麦多课文档分享上搜索。
1、 FIPS PUB 186-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8900 Issued June, 2009 U.S. Department o
2、f Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick Gallagher, Deputy Director Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FOREWORD The Federal Information Processing Standards Publication Series of the Nationa
3、l Institute of Standards and Technology (NIST) is the official series of publications relating to standards and guidelines adopted and promulgated under the provisions of the Federal Information Security Management Act (FISMA) of 2002. Comments concerning FIPS publications are welcomed and should be
4、 addressed to the Director, Information Technology Laboratory, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8900, Gaithersburg, MD 20899-8900. Cita Furlani, Director Information Technology Laboratory Abstract This Standard specifies a suite of algorithms that can be used to
5、 generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fa
6、ct, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time. Key words: computer security, cryptography, digital signatures, Federal Information Processing Standards, public key cryptography. Provided by IHSNot f
7、or ResaleNo reproduction or networking permitted without license from IHS-,-,-Federal Information Processing Standards Publication 186-3 June 2009 Announcing the DIGITAL SIGNATURE STANDARD (DSS) Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of
8、 Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Management Reform Act of 1996 (Public Law 104-106), and the Computer Security Act of 1987 (Public Law 100-235). 1. Name of Standard: Digital Signature Standard (DSS) (F
9、IPS 186-3). 2. Category of Standard: Computer Security. Subcategory. Cryptography. 3. Explanation: This Standard specifies algorithms for applications requiring a digital signature, rather than a written signature. A digital signature is represented in a computer as a string of bits. A digital signa
10、ture is computed using a set of rules and a set of parameters that allow the identity of the signatory and the integrity of the data to be verified. Digital signatures may be generated on both stored and transmitted data. Signature generation uses a private key to generate a digital signature; signa
11、ture verification uses a public key that corresponds to, but is not the same as, the private key. Each signatory possesses a private and public key pair. Public keys may be known by the public; private keys are kept secret. Anyone can verify the signature by employing the signatorys public key. Only
12、 the user that possesses the private key can perform signature generation. A hash function is used in the signature generation process to obtain a condensed version of the data to be signed; the condensed version of the data is often called a message digest. The message digest is input to the digita
13、l signature algorithm to generate the digital signature. The hash functions to be used are specified in the Secure Hash Standard (SHS), FIPS 180-3. FIPS approved digital signature algorithms shall be used with an appropriate hash function that is specified in the SHS. The digital signature is provid
14、ed to the intended verifier along with the signed data. The verifying entity verifies the signature by using the claimed signatorys public key and the same hash function that was used to generate the signature. Similar procedures may be used to generate and verify signatures for both stored and tran
15、smitted data. 4. Approving Authority: Secretary of Commerce. i Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-5. Maintenance Agency: Department of Commerce, National Institute of Standards and Technology, Information Technology Laboratory, Computer
16、Security Division. 6. Applicability: This Standard is applicable to all Federal departments and agencies for the protection of sensitive unclassified information that is not subject to section 2315 of Title 10, United States Code, or section 3502 (2) of Title 44, United States Code. This Standard sh
17、all be used in designing and implementing public key-based signature systems that Federal departments and agencies operate or that are operated for them under contract. The adoption and use of this Standard is available to private and commercial organizations. 7. Applications: A digital signature al
18、gorithm allows an entity to authenticate the integrity of signed data and the identity of the signatory. The recipient of a signed message can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as n
19、on-repudiation, since the signatory cannot easily repudiate the signature at a later time. A digital signature algorithm is intended for use in electronic mail, electronic funds transfer, electronic data interchange, software distribution, data storage, and other applications that require data integ
20、rity assurance and data origin authentication. 8. Implementations: A digital signature algorithm may be implemented in software, firmware, hardware or any combination thereof. NIST has developed a validation program to test implementations for conformance to the algorithms in this Standard. Informat
21、ion about the validation program is available at http:/csrc.nist.gov/cryptval. Examples for each digital signature algorithm are available at http:/csrc.nist.gov/groups/ST/toolkit/examples.html. Agencies are advised that digital signature key pairs shall not be used for other purposes. 9. Other Appr
22、oved Security Functions: Digital signature implementations that comply with this Standard shall employ cryptographic algorithms, cryptographic key generation algorithms, and key establishment techniques that have been approved for protecting Federal government sensitive information. Approved cryptog
23、raphic algorithms and techniques include those that are either: a. specified in a Federal Information Processing Standard (FIPS), b. adopted in a FIPS or a NIST Recommendation, or c. specified in the list of approved security functions for FIPS 140-2. 10. Export Control: Certain cryptographic device
24、s and technical data regarding them are subject to Federal export controls. Exports of cryptographic modules implementing this Standard and technical data regarding them must comply with these Federal regulations and be licensed by the Bureau of Industry and Security of the U.S. Department of Commer
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AIRFORCEFIPSPUB1863CHGNOTICE12009DIGITALSIGNATURESTANDARDDSSPDF

链接地址:http://www.mydoc123.com/p-427395.html