• There are no items in your cart

BS ISO/IEC 15946-1:2016

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Cryptographic techniques based on elliptic curves General

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

31-07-2016

€254.76
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols
5 Conventions for fields
6 Conventions for elliptic curves
7 Conversion functions
8 Elliptic curve domain parameters and public key
Annex A (informative) - Background information on finite fields
Annex B (informative) - Background information on elliptic
        curves
Annex C (informative) - Background information on elliptic
        curve cryptosystems
Annex D (informative) - Summary of coordinate systems
Bibliography

Defines the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-2 and other ISO/IEC standards.

Committee
IST/33/2
DevelopmentNote
Supersedes 99/652608 DC. (02/2003) Supersedes 07/30135624 DC. (02/2009) Supersedes 15/30318285 DC. (07/2016)
DocumentType
Standard
Pages
42
PublisherName
British Standards Institution
Status
Current
Supersedes

This part of ISO/IEC15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC15946‑5 , ISO/IEC9796‑3 , ISO/IEC11770‑3 , ISO/IEC14888‑3 , ISO/IEC18033‑2 and other ISO/IEC standards. This part of ISO/IEC15946 does not specify the implementation of the techniques it defines. For example, it does not specify the basis representation to be used when the elliptic curve is defined over a finite field of characteristic two. Thus, interoperability of products complying with this part of ISO/IEC15946 will not be guaranteed.

Standards Relationship
ISO/IEC 15946-1:2016 Identical

ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.