NIST proposes update to digital signature standard

April 18, 2012

The National Institute of Standards and Technology (NIST) has announced proposed changes to a standard that specifies how to implement digital signatures, which can be used to ensure the integrity of electronic documents, such as wills and contracts, as well as the identity of the signer.

These proposed changes to the Federal Standard (FIPS) 186-3, known as the Digital Signature Standard, were posted for public comment on April 10, 2012. First published in 1994 and revised several times since then, the standard provides a means of guaranteeing authenticity in the digital world by means of operations based on complex math that are all but impossible to "forge". Updates to the standard are still necessary as technology changes.

The proposed revisions provide clarification on how to implement the digital signature algorithms approved in the standard: the Digital Signature Algorithm (DSA), the Elliptic Curve Algorithm (ECDSA) and the Rivest-Shamir-Adelman algorithm (RSA). Included in the proposed revision is allowing the use of additional, approved random number generators, which are used to generate the cryptographic keys used for the generation and verification of digital signatures.

Explore further: In Brief: TDC updates security for digital signature

More information: The comment period on the proposal is open until May 25, 2012. Both FIPS 186-3 and a separate four-page document outlining the proposed changes are available at . Electronic comments may be sent to: , with ''186-3 Change Notice'' in the subject line.

Related Stories

NIST 'Standard Bullet' fights gang violence

January 19, 2007

Researchers at the National Institute of Standards and Technology (NIST) have developed a copper bullet designed to help end criminal sprees without once being fired. Crime laboratories can use NIST's "Standard Bullet" to ...

Software Helps Developers Get Started with PIV Cards

July 10, 2008

The National Institute of Standards and Technology has developed two demonstration software packages that show how Personal Identity Verification (PIV) cards can be used with Windows and Linux systems to perform logon, digital ...

Hitachi Unveils Digital Signatures on Stand-Alone Memory Chips

September 25, 2008

Hitachi announced today the development of a mechanism for attesting the authenticity of memory chips using highly secure digital signatures in a worldwide breakthrough. Since the mechanism requires neither a CPU nor a computational ...

Experts uncover weakness in Internet security

December 30, 2008

Independent security researchers in California and researchers at the Centrum Wiskunde & Informatica (CWI) in the Netherlands, EPFL in Switzerland, and Eindhoven University of Technology (TU/e) in the Netherlands have found ...

Build safety into the very beginning of the computer system

April 29, 2011

A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic Input/Output System (BIOS), this ...

Recommended for you

Making 3-D imaging 1,000 times better

December 1, 2015

MIT researchers have shown that by exploiting the polarization of light—the physical phenomenon behind polarized sunglasses and most 3-D movie systems—they can increase the resolution of conventional 3-D imaging devices ...

US ends bulk collection of phone data

November 30, 2015

The US government has halted its controversial program to collect vast troves of information from Americans' phone calls, a move prompted by the revelations of former intelligence analyst Edward Snowden.


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.