ISO/IEC 15946-5:2017
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
Hardcopy , PDF
English
11-08-2017
09-04-2025
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946‑1.
ISO/IEC 15946-5:2017 defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192‑4, ISO/IEC 9796‑3, ISO/IEC 11770‑3, ISO/IEC 14888‑3 and ISO/IEC 18033‑2.
ISO/IEC 15946-5:2017 is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).
The ISO/IEC 15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC 15946 series will not be guaranteed.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
30
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| NEN ISO/IEC 15946-5 : 2017 | Identical |
| BS ISO/IEC 15946-5:2017 | Identical |
| BS EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
| BS ISO/IEC 9796-3:2006 | Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
| I.S. EN 419212-2:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
| I.S. EN 419212-1:2017 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
| 12/30236955 DC : 0 | BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY |
| 12/30255296 DC : DRAFT MAR 2012 | BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
| BS ISO/IEC 18370-2:2016 | Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms |
| 15/30318285 DC : 0 | BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
| BS ISO/IEC 15946-1:2016 | Information technology. Security techniques. Cryptographic techniques based on elliptic curves General |
| ISO/IEC 18370-2:2016 | Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms |
| ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
| ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
| 12/30255293 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| 16/30345808 DC : 0 | BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
| BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
| BS ISO/IEC 20008-2:2013 | Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key |
| PREN 419212-1 : DRAFT 2016 | APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
| 14/30302798 DC : 0 | BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
| BS EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
| 16/30345811 DC : 0 | BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| EN 419212-1:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
| EN 419212-2:2017 | Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
| BS ISO/IEC 11889-1:2009 | Information technology. Trusted platform module Overview |
| ISO/IEC 20008-2:2013 | Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key |
| 15/30268565 DC : 0 | BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
| ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General |
| INCITS/ISO/IEC 11889-1:2015(2019) | Information technology -- Trusted platform module library -- Part 1: Architecture |
| INCITS/ISO/IEC 18370-2:2016(R2019) | Information technology -- Security techniques - - Blind digital signatures -- Part 2: Discrete logarithm based mechanisms |
| ISO/IEC 18032:2005 | Information technology — Security techniques — Prime number generation |
| ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General |
| ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| FIPS PUB 186 : 0 | DIGITAL SIGNATURE STANDARD (DSS) |
| ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.