The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.

See the following for more information:

NIST SP 800-12 Rev. 1 under Digital Signature from FIPS 140-2 for more information.
NIST SP 1800-16B under Digital Signature
NIST SP 1800-16C under Digital Signature
NIST SP 1800-16D under Digital Signature

An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation, but not confidentiality protection.

See NIST SP 800-63-3 under Digital Signature, NISTIR 8011 Vol. 3 under Digital Signature from NIST SP 800-63-3  for more information.

Share this Post