
FIPS PUB 186 : 0
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

DIGITAL SIGNATURE STANDARD (DSS)
05-07-2023
1. INTRODUCTION
2. GENERAL
3. USE OF THE DSA ALGORITHM
4. DSA PARAMETERS
5. SIGNATURE GENERATION
6. SIGNATURE VERIFICATION
APPENDIX 1. A PROOF THAT [NU] = r'
APPENDIX 2. GENERATION OF PRIMES FOR THE DSA
APPENDIX 3. RANDOM NUMBER GENERATION FOR THE DSA
APPENDIX 4. GENERATION OF OTHERS QUANTITIES
APPENDIX 5. EXAMPLE OF THE DSA
Specifies a Digital Signature Algorithm (DSA) appropriate for applications requiring a digital, rather than written, signature.
Committee |
AREA IPSC
|
DocumentType |
Standard
|
PublisherName |
US Military Specs/Standards/Handbooks
|
Status |
Withdrawn
|
MIL-STD-1840 Revision C:1997 | AUTOMATED INTERCHANGE OF TECHNICAL INFORMATION |
PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
ISO/IEC 13157-2:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 2: NFC-SEC cryptography standard using ECDH and AES |
16/30339535 DC : 0 | BS EN 62056-5-3 ED 3.0 - ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
BS ISO/IEC 19770-3:2016 | Information technology. IT asset management Entitlement schema |
PD IEC/TS 60870-5-7:2013 | Telecontrol equipment and systems Transmission protocols. Security extensions to IEC 60870-5-101 and IEC 60870-5-104 protocols (applying IEC 62351) |
IEEE 1363.3-2013 | IEEE Standard for Identity-Based Cryptographic Techniques using Pairings |
IEEE 1363.2 : 2008 | SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
I.S. EN 62056-5-3:2017 | ELECTRICITY METERING DATA EXCHANGE - THE DLMS/COSEM SUITE - PART 5-3: DLMS/COSEM APPLICATION LAYER |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
PREN 419212-5 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
ISO/IEC 19770-3:2016 | Information technology IT asset management Part 3: Entitlement schema |
ASTM E 1762 : 1995 | Standard Guide for Electronic Authentication of Health Care Information |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
ASTM E 2085 : 2000 : REV A | Standard Guide on Security Framework for Healthcare Information (Withdrawn 2009) |
CEN/TS 15130:2006 | Postal services - DPM infrastructure - Messages supporting DPM applications |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
EN 62056-5-3:2017 | Electricity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
ISO/IEC 18013-3:2017 | Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
DD CEN/TS 15130:2006 | Postal services. DPM infrastructure. Messages supporting DPM applications |
PREN 14890-1 : DRAFT 2012 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30335567 DC : 0 | BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION |
BS EN 62056-5-3:2017 | Electrcity metering data exchange. The DLMS/COSEM suite DLMS/COSEM application layer |
CAN/CSA-ISO/IEC 19678:16 | Information Technology BIOS Protection Guidelines (Adopted ISO/IEC 19678:2015, first edition, 2015-05-01) |
ANSI INCITS 516 : 2013(R2018) | INFORMATION TECHNOLOGY - SCSI STREAM COMMANDS - 4 (SSC-4) |
16/30335156 DC : 0 | BS EN 14615 - POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
CEI UNI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
SCTE 41 : 2016 | POD COPY PROTECTION SYSTEM |
BS ISO/IEC 19770-2:2015 | Information technology. Software asset management Software identification tag |
PD IEC/TS 62224:2013 | Multimedia home server systems. Conceptual model for digital rights management |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
BS ISO/IEC 18367:2016 | Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
ISO 20215:2015 | Space data and information transfer systems — CCSDS cryptographic algorithms |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 18013-3:2017 | Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
ISO/IEC 18370-2:2016 | Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms |
ARINC 823-1 : 2007 | DATALINK SECURITY - PART 1: ACARS MESSAGE SECURITY |
ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing |
ISO/IEC/IEEE 8802-22:2015 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
BS ISO/IEC/IEEE 8802-22:2015 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands |
ISO/IEC 29167-17:2015 | Information technology — Automatic identification and data capture techniques — Part 17: Crypto suite cryptoGPS security services for air interface communications |
15/30228996 DC : 0 | BS ISO/IEC 19770-3 - INFORMATION TECHNOLOGY - IT ASSET MANAGEMENT - PART 3: SOFTWARE ENTITLEMENT SCHEMA |
SMPTE ST 429.6 : 2006 AMD 1 2018 | D-CINEMA PACKAGING - MXF TRACK FILE ESSENCE ENCRYPTION |
UNI CEI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
BS ISO 20215:2015 | Space data and information transfer systems. CCSDS cryptographic algorithms |
PD CEN/TS 16702-1:2014 | Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
BS ISO/IEC 14888-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
14/30297103 DC : 0 | BS ISO/IEC 19678 - INFORMATION TECHNOLOGY - BIOS PROTECTIONS |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
ISO/IEC/IEEE 8802-15-6:2017 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
MIL-STD-2045-47001 Revision D:2005 | CONNECTIONLESS DATA TRANSFER APPLICATION LAYER STANDARD |
BIS IS/IEC/TS 62351-5 : 2009(R2016) | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
ISO/IEC/IEEE 8802-21:2018 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 21: Media independent services framework |
S.R. CWA 16745:2014 | IMPROVING TRANSPARENCY IN FINANCIAL AND BUSINESS REPORTING - METADATA CONTAINER |
S.R. CEN/TS 16702-1:2014 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
ISO/IEC 15946-5:2017 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 15444-2:2004 | Information technology JPEG 2000 image coding system: Extensions Part 2: |
IEC 62056-5-3:2017 | Electrcity metering data exchange - The DLMS/COSEM suite - Part 5-3: DLMS/COSEM application layer |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
ISO/IEC 29167-12:2015 | Information technology — Automatic identification and data capture techniques — Part 12: Crypto suite ECC-DH security services for air interface communications |
ISO/IEC 19678:2015 | Information Technology — BIOS Protection Guidelines |
14/30284313 DC : 0 | BS ISO 32000-2 - DOCUMENT MANAGEMENT - PORTABLE DOCUMENT FORMAT - PART 2: PDF 2.0 |
CAN/CSA-ISO/IEC/IEEE 8802-22:16 | Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications: Policies and Procedures for Operation in the TV Bands (Adopted ISO/IEC/IEEE 8802-22:2015, first edition, 2015-05-01) |
BS ISO/IEC 15946-5:2017 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation |
ANSI X9.112-2 : 2014 | WIRELESS MANAGEMENT AND SECURITY - PART 2: ATM AND POS |
DD IEC TS 62351-5 : DRAFT OCT 2009 | POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE - DATA AND COMMUNICATIONS SECURITY - PART 5: SECURITY FOR IEC 60870-5 AND DERIVATIVES |
CAN/CSA-ISO/IEC 29167-12:16 | Information technology Automatic identification and data capture techniques Part 12: Crypto suite ECC-DH security services for air interface communication (Adopted ISO/IEC 29167-12:2015, first edition, 2015-05-15) |
PREN 14615 : DRAFT 2016 | POSTAL SERVICES - DIGITAL POSTAGE MARKS - APPLICATIONS, SECURITY AND DESIGN |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
DD IEC/TS 62351-2:2008 | Power systems management and associated information exchange. Data and communications security Glossary of terms |
IEEE DRAFT 1609.2 : 0 | WIRELESS ACCESS IN VEHICULAR ENVIRONMENTS - SECURITY SERVICES FOR APPLICATIONS AND MANAGEMENT MESSAGES |
ASTM E 1762 : 1995 : R2009 | Standard Guide for Electronic Authentication of Health Care Information |
SCTE 23-2 : 2017 | DOCSIS 1.1 - PART 2: BASELINE PRIVACY PLUS INTERFACE |
SCTE 24-10 : 2016 | IPCABLECOM 1.0 - PART 10: SECURITY SPECIFICATION |
ASTM E 1762 : 1995 : R2013 | Standard Guide for Electronic Authentication of Health Care Information (Withdrawn 2017) |
I.S. CEN TS 15130:2006 | POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 14776-333:2013 | Information technology — Small Computer System Interface (SCSI) — Part 333: SCSI Stream Commands - 3 (SSC-3) |
ISO 26429-6:2008 | Digital cinema (D-cinema) packaging — Part 6: MXF track file essence encryption |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
IEC TS 62351-2:2008 | Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
IEC TS 62224:2013 | Multimedia home server systems - Conceptual model for digital rights management |
IEC 62351-11:2016 | Power systems management and associated information exchange - Data and communications security - Part 11: Security for XML documents |
BS ISO/IEC 19678:2015 | Information Technology. BIOS Protection Guidelines |
UNI EN 419212-1 : 2015 | APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
ISO/IEC 19770-2:2015 | Information technology — IT asset management — Part 2: Software identification tag |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS EN 62351-11:2017 | Power systems management and associated information exchange. Data and communications security Security for XML documents |
BS ISO/IEC 24713-3:2009 | Information technology. Biometric profiles for interoperability and data interchange Biometrics-based verification and identification of seafarers |
BS ISO/IEC/IEEE 8802-1AR:2014 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks Secure device identity |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
15/30268565 DC : 0 | BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
BS ISO 26429-6:2008 | Digital cinema (D-cinema) packaging MXF track file essence encryption |
DD IEC TS 62224 : DRAFT 2007 | MULTIMEDIA HOME SERVER SYSTEMS - CONCEPTUAL MODEL FOR DIGITAL RIGHTS MANAGEMENT |
BS ISO/IEC/IEEE 8802-21:2018 | Information technology. Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements Media independent services framework |
ANSI X9.82-3 : 2007(R2017) | RANDOM NUMBER GENERATION - PART 3: DETERMINISTIC RANDOM BIT GENERATORS |
ISO/IEC/IEEE 8802-1AR:2014 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AR: Secure device identity |
ISO/IEC 20248:2018 | Information technology — Automatic identification and data capture techniques — Data structures — Digital signature meta structure |
ASTM E 1762 : 1995 : R2003 | Standard Guide for Electronic Authentication of Health Care Information |
IEEE 1815-2012 REDLINE | IEEE Standard for Electric Power Systems Communications-Distributed Network Protocol (DNP3) |
IEEE 802.22-2011 | IEEE Standard for Information technology-- Local and metropolitan area networks-- Specific requirements-- Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands |
ISO/IEC 24713-3:2009 | Information technology Biometric profiles for interoperability and data interchange Part 3: Biometrics-based verification and identification of seafarers |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
16/30345819 DC : 0 | BS EN 419212-5 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 5: TRUSTED ESERVICE |
EN 62351-11:2017 | Power systems management and associated information exchange – Data and communications security - Part 11: Security for XML documents |
CAN/CSA-ISO/IEC 18367:18 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.
Logging out.