BS ISO/IEC 15946-5:2017
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation
Hardcopy , PDF
08-04-2022
English
18-09-2017
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and conversion functions
5 Framework for elliptic curve generation
6 Verifiably pseudo-random elliptic curve generation
7 Constructing elliptic curves by complex multiplication
8 Constructing elliptic curves by lifting
Annex A (informative) - Background information on elliptic
curves
Annex B (informative) - Background information on elliptic
curve cryptosystems
Annex C (informative) - Numerical examples
Annex D (informative) - Summary of properties of elliptic
curves generated by the complex multiplication method
Bibliography
Describes public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 16/30335567 DC. (10/2017)
|
DocumentType |
Standard
|
Pages |
40
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
The ISO/IEC15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC15946‑1 .
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC29192‑4 , ISO/IEC9796‑3 , ISO/IEC11770‑3 , ISO/IEC14888‑3 and ISO/IEC18033‑2 .
This document is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).
The ISO/IEC15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC15946 series will not be guaranteed.
Standards | Relationship |
ISO/IEC 15946-5:2017 | Identical |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.