Navigation and service

Information from the BSI for algorithm catalogues from previous years

The information provided by the BSI in previous years for the algorithm catalogue can be found here in PDF format. The information from previous years that has a direct impact on the current catalogue due to the seven-year validity of the catalogue is listed here.

Only the final information from the BSI, the opinion of the BSI after final assessment of the incoming comments and the results of the expert hearing are listed. In the past, this information from the BSI did not always correspond in full to the catalogue published in the Federal Gazette.

In addition to the digital signature method mentioned in the algorithm catalogue, it is also possible to design electronic signatures using

  • hash functions [see RALPH C. MERKLE. Protocols for public key cryptosystems. In Symposium on Security and Privacy, Oakland, CA, USA, pages 122--134 (1980).],
  • symmetrical cryptographic algorithms [see RALPH C. MERKLE. A Digital Signature Based on a Conventional Encryption Function. In A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, pages 369--378 (Springer-Verlag, 1987). ISBN 3-540-18796-0.]
  • or biometric methods [see JÖRG M. LENZ CHRISTIANE SCHMIDT. Die elektronische Signatur--eine Analogie zur eigenhändigen Unterschrift? [The electronic signature--analogous to handwritten signatures?] (Deutscher Sparkassen Verlag, 2004). ISBN 3-09-3057058-1.]