This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. In addition, the recipient of signed data can use a digital signature as evidence in demonstrating to a third party that the signature was, in fact, generated by the claimed signatory. This is known as non-repudiation, since the signatory cannot easily repudiate the signature at a later time.
Standard Identifier: FIPS PUB 186-4
- Simple Exploit Allows Attackers to Modify Email Content – Even After It’s Sent! Digest Article
- Democratize Anomaly Detection Technologies: Challenges, Advances, and Opportunities CSIAC Webinar
- Hundreds of Millions in Digital Currency Remains Frozen Digest Article
- CWI, Google Announce First Collision for Industry Security Standard SHA-1 Digest Article
- North Korea Hackers Stole South Korea-U.S. Military Plans to Wipe Out North Korea Leadership: Lawmaker Digest Article