Lines Matching refs:DSA
1 # DSA chapter
5 The digital signature algorithm (DSA) is one of three signature schemes
10 4.2 Selection of Parameter Sizes and Hash Functions for DSA
31 The DSA signature algorithm requires that each signature is computed with a new
33 If that is not the case then DSA signatures can leak the private key that was
41 A DSA signature is a DER encoded tuple of two integers (r,s). To verify a
91 However, Oracle released a patch that removed the length verification in DSA in
96 ….java.net/jdk9/dev/jdk/file/edd7a67585a5/src/java.base/share/classes/sun/security/provider/DSA.java
102 While generating 2048 bit DSA keys in jdk7 was not yet supported, doing so in
111 KeyPairGenerator keygen = KeyPairGenerator.getInstance("DSA");
114 Signature s = Signature.getInstance("DSA");
118 The first three lines generate a 2048 bit DSA key. 2048 bits is currently the
122 KeyPairGenerator keygen = KeyPairGenerator.getInstance("DSA");
130 generates by default a 256 bit q for 2048 bit DSA keys.
135 Signature s = Signature.getInstance("DSA");
142 Hence the code above uses SHA1 but with DSA parameters generated for SHA-224
149 Hence, k severely biased. Attacks against DSA with biased k are well known.
160 The short algorithm name “DSA” is misleading, since it hides the fact that
161 `Signature.getInstance(“DSA”)` is equivalent to
173 A possible way to push such a change are code analysis tools. "DSA" is in good