U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

DSIG

Abbreviation(s) and Synonym(s):

Digital Signature

Definition(s):

  The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
Source(s):
NIST SP 800-12 Rev. 1 under Digital Signature from FIPS 140-2

  An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.
Source(s):
NIST SP 800-63-3 under Digital Signature
NISTIR 8011 Vol. 3 under Digital Signature from NIST SP 800-63-3

  The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, assurance of data integrity, and signatory non-repudiation.
Source(s):
NIST SP 1800-16B under Digital Signature from NIST SP 800-133
NIST SP 1800-16C under Digital Signature from NIST SP 800-133
NIST SP 1800-16D under Digital Signature from NIST SP 800-133

  The result of a cryptographic transformation of data that, when properly implemented, provides the services of origin authentication, data integrity, and signer nonrepudiation.
Source(s):
NISTIR 7316 under Digital Signature

  The result of a transformation of a message by means of a cryptographic system using keys such that a Relying Party can determine: (1) whether the transformation was created using the private key that corresponds to the public key in the signer’s digital certificate; and (2) whether the message has been altered since the transformation was made.
Source(s):
NIST SP 800-32 [Withdrawn] under Digital Signature

  An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.
Source(s):
NIST SP 800-63-2 [Superseded] under Digital Signature