The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
Source(s):
NIST SP 800-12 Rev. 1
under Digital Signature
from
FIPS 140-2
The result of a cryptographic transformation of data that, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
Source(s):
CNSSI 4009-2015
from
FIPS 140-2, NIST SP 800-57 Part 1 Rev. 3
An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.
Source(s):
NIST SP 800-63-3
under Digital Signature
NISTIR 8011 Vol. 3
under Digital Signature
from
NIST SP 800-63-3
The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity and signatory non-repudiation.
Source(s):
NIST SP 800-102
under Digital signature
NIST SP 800-133
[Superseded]
under Digital signature
The output that results from the successful completion of a digital signature algorithm operating on data (e.g., a message) that is to be signed. When used appropriately, a digital signature can provide assurance of data integrity, origin authentication, and signatory non-repudiation. See [FIPS 186-3] for details.
Source(s):
NIST SP 800-106
under Digital signature
The result of applying two cryptographic functions (a hash function, followed by a digital signature function; see FIPS 186-3 for details). When the functions are properly implemented, the digital signature provides origin authentication, data integrity protection and signatory non-repudiation.
Source(s):
NIST SP 800-107 Rev. 1
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of:
1. Origin authentication,
2. Data integrity, and
3. Signer non-repudiation.
Source(s):
NIST SP 800-152
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, data integrity and signatory non-repudiation.
Source(s):
NIST SP 800-89
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented, provides the services of: 1. Source/entity authentication, 2. Data integrity authentication, and/or 3. Support for signer non-redudiation.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented, provides the services of 1. Source authentication, 2. Data integrity, and 3. Support for signer non-repudiation.
Source(s):
NIST SP 800-175B Rev. 1
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of: 1. Source/identity authentication, 2. Data integrity authentication, and/or 3. Support for signer non-repudiation.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented, provides source authentication, assurance of data integrity, and supports signatory non-repudiation.
Source(s):
NIST SP 800-133 Rev. 2
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity, and signatory non-repudiation.
Source(s):
NIST SP 1800-16B
under Digital Signature
from
NIST SP 800-133
NIST SP 1800-16C
under Digital Signature
from
NIST SP 800-133
NIST SP 1800-16D
under Digital Signature
from
NIST SP 800-133
The result of a cryptographic transformation of data that, when properly implemented, provides the services of origin authentication, data integrity, and signer nonrepudiation.
Source(s):
NISTIR 7316
under Digital Signature
A cryptographic technique that utilizes asymmetric-keys to determine authenticity (i.e., users can verify that the message was signed with a private key corresponding to the specified public key), non-repudiation (a user cannot deny having sent a message) and integrity (that the message was not altered during transmission).
Source(s):
NISTIR 8202
under Digital signature
a data unit that allows a recipient of a message to verify the identity of the signatory and integrity of the message.
Source(s):
NIST SP 800-15
[Withdrawn]
The result of a transformation of a message by means of a cryptographic system using keys such that a Relying Party can determine: (1) whether the transformation was created using the private key that corresponds to the public key in the signer’s digital certificate; and (2) whether the message has been altered since the transformation was made.
Source(s):
NIST SP 800-32
[Withdrawn]
under Digital Signature
The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of: 1. Origin authentication, 2. Data integrity, and 3. Signer non-repudiation.
Source(s):
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Digital signature
The result of a cryptographic transformation of data that, when
properly implemented, provides the services of:
1. origin authentication
2. data integrity, and
3. signer non-repudiation.
Source(s):
NIST SP 800-57 Part 2
[Superseded]
under Digital signature
An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
Source(s):
NIST SP 800-63-2
[Superseded]
under Digital Signature
The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity and supports signatory nonrepudiation.
Source(s):
NIST SP 800-133 Rev.1
[Superseded]
under Digital signature
The result of a cryptographic transformation of data that, when properly implemented with a supporting infrastructure and policy, provides the services of:
1. Origin (i.e., source) authentication,
2. Data integrity authentication, and
3. Support for signer non-repudiation.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Digital signature