Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
NIST-SP-800-106

NIST-SP-800-106

Ratings: (0)|Views: 2|Likes:
Published by Michael Williams

More info:

Published by: Michael Williams on Feb 09, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/08/2014

pdf

text

original

 
 
NIST Special Publication 800-106
Randomized Hashingfor Digital Signatures
Quynh DangComputer Security DivisionInformation Technology Laboratory
C O M P U T E R S E C U R I T Y
February 2009U.S. Department of Commerce
Otto J. Wolff, Acting Secretary
National Institute of Standards and Technology
 Patrick D. Gallagher, Deputy Director 
 
NIST SP 800-106
Randomized Hashing for Digital Signatures
 
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards andTechnology (NIST) promotes the U.S. economy and public welfare by providing technicalleadership for the Nation’s measurement and standards infrastructure. ITL develops tests, testmethods, reference data, proof of concept implementations, and technical analysis to advance thedevelopment and productive use of information technology. ITL’s responsibilities include thedevelopment of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of non-national security-related information in Federalinformation systems. This special publication 800-series reports on ITL’s research, guidelines,and outreach efforts in information system security, and its collaborative activities with industry,government, and academic organizations.
.
 
ii
 
NIST SP 800-106
Randomized Hashing for Digital Signatures
 
Abstract
 NIST approved digital signature algorithms require the use of an approved cryptographic hashfunction in the generation and verification of signatures. Approved cryptographic hash functionsand digital signature algorithms can be found in [FIPS 180-3] and [FIPS 186-3], respectively.The security provided by the cryptographic hash function is vital to the security of a digitalsignature application. This Recommendation specifies a method to enhance the security of thecryptographic hash functions used in digital signature applications by randomizing the messagesthat are signed.KEY WORDS: digital signature, cryptographic hash function, hash function, collision resistance,randomized hashing.iii

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->