• BS ISO/IEC 15946-5:2017

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation

    Available format(s):  Hardcopy, PDF

    Superseded date:  08-04-2022

    Language(s):  English

    Published date:  18-09-2017

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and conversion functions
    5 Framework for elliptic curve generation
    6 Verifiably pseudo-random elliptic curve generation
    7 Constructing elliptic curves by complex multiplication
    8 Constructing elliptic curves by lifting
    Annex A (informative) - Background information on elliptic
            curves
    Annex B (informative) - Background information on elliptic
            curve cryptosystems
    Annex C (informative) - Numerical examples
    Annex D (informative) - Summary of properties of elliptic
            curves generated by the complex multiplication method
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.

    Scope - (Show below) - (Hide below)

    The ISO/IEC15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC15946‑1 .

    This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC29192‑4 , ISO/IEC9796‑3 , ISO/IEC11770‑3 , ISO/IEC14888‑3 and ISO/IEC18033‑2 .

    This document is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).

    The ISO/IEC15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC15946 series will not be guaranteed.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 16/30335567 DC. (10/2017)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective