NIST proposes update to digital signature standard

April 18, 2012

The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of electronic documents, such as wills and contracts, as well as the identity of the signer.

These proposed changes to the Federal Standard (FIPS) 186-3, known as the Digital Signature Standard, were posted for public comment on April 10, 2012. First published in 1994 and revised several times since then, the standard provides a means of guaranteeing authenticity in the digital world by means of operations based on complex math that are all but impossible to "forge". Updates to the standard are still necessary as technology changes.

The proposed revisions provide clarification on how to implement the digital signature algorithms approved in the standard: the Digital Signature Algorithm (DSA), the Elliptic Curve Algorithm (ECDSA) and the Rivest-Shamir-Adelman algorithm (RSA). Included in the proposed revision is allowing the use of additional, approved random number generators, which are used to generate the cryptographic keys used for the generation and verification of digital signatures.

Explore further: In Brief: TDC updates security for digital signature

More information: The comment period on the proposal is open until May 25, 2012. Both FIPS 186-3 and a separate four-page document outlining the proposed changes are available at csrc.nist.gov/publications/PubsDrafts.html . Electronic comments may be sent to: fips_186-3_change_notice@nist.gov , with ''186-3 Change Notice'' in the subject line.

Related Stories

NIST 'Standard Bullet' fights gang violence

January 19, 2007

Researchers at the National Institute of Standards and Technology (NIST) have developed a copper bullet designed to help end criminal sprees without once being fired. Crime laboratories can use NIST's "Standard Bullet" to ...

Software Helps Developers Get Started with PIV Cards

July 10, 2008

The National Institute of Standards and Technology has developed two demonstration software packages that show how Personal Identity Verification (PIV) cards can be used with Windows and Linux systems to perform logon, digital ...

Hitachi Unveils Digital Signatures on Stand-Alone Memory Chips

September 25, 2008

Hitachi announced today the development of a mechanism for attesting the authenticity of memory chips using highly secure digital signatures in a worldwide breakthrough. Since the mechanism requires neither a CPU nor a computational ...

Experts uncover weakness in Internet security

December 30, 2008

Independent security researchers in California and researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands have found ...

Build safety into the very beginning of the computer system

April 29, 2011

A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this ...

Recommended for you

Robo-whiskers mimic animals exploring their surroundings

August 4, 2015

Many mammals, including seals and rats, rely on their whiskers to sense their way through dark environments. Inspired by these animals, scientists working at the University of Illinois at Urbana-Champaign and Illinois' Advanced ...

Thunderstrike 2: Proof-of-concept worm could infect Macs

August 4, 2015

Two researchers, Xeno Kovah co-founder of LegbaCore and Trammell Hudson, a security engineer with Two Sigma Investments, have created a proof of concept worm capable of attacking Mac computers. The worm which they designed ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.