DSA Sign/Verify
Online DSA sign and verify tool with SHA-1/SHA-224/SHA-256, PEM keys, and DER parsing for legacy migration, protocol debugging, and historical signature audits.
Key generation calls a server-side API; message signing and signature verification run locally in your browser and are not uploaded.
Loading DSA runtime...
FIPS 186-5 Deprecation Notice
FIPS 186-5 deprecates DSA for new signature generation. New systems should prefer ECDSA or Ed25519.
Generate DSA Key Pair
Generate DSA PEM keys with secure server entropy and auto-fill signing and verification panels.
DSA Guide
DSA is a classic DSS signature algorithm. This tool focuses on legacy signing and verification workflows with PEM keys, flexible input formats, and parsed signature outputs.
Generate DSA Keys with OpenSSL
Use the commands below when you need offline key generation.
openssl dsaparam -out dsaparam.pem 2048
openssl gendsa -out private.pem dsaparam.pem
openssl dsa -in private.pem -pubout -out public.pem
FIPS 186-5 Status
Since 2023, DSA is no longer approved for new signature generation. It is mainly retained for validating historical signatures and legacy interoperability. New systems should migrate to ECDSA or Ed25519.
Key Features
- Supports SHA-1, SHA-224, and SHA-256 for DSA workflows.
- Supports Text, Hex, Base64, spaced Hex, and C/C++ array inputs.
- Shows raw signature, R/S components, and DER encoding.
- Supports PEM private key signing and PEM public key verification.
- Supports 1024/2048/3072-bit key generation options.
Parameter and Key Guidance
- 2048-bit: recommended default balancing compatibility and security.
- 3072-bit: higher security margin with higher compute cost.
- 1024-bit: legacy compatibility only; avoid for new systems.
- Use PEM as the standard format for key storage and transport.
Hash Guidance
- SHA-256: recommended default for most scenarios.
- SHA-224: useful for protocol compatibility requirements.
- SHA-1: for legacy verification only, not for new signing.
Security Notes
- Store private keys only in controlled environments.
- For migrations, enable dual-track verification with audit logs.
- Log source, digest, and timestamp when verification fails.
- Prefer ECDSA or Ed25519 for new deployments.
Quick Comparison
| Metric | DSA(2048) | ECDSA(P-256) | Ed25519 |
|---|---|---|---|
| Public key size | Larger | Medium | Smaller |
| Signing speed | Medium | Fast | Faster |
| Recommended for new systems | No | Yes | Yes |