1.212.642.4980     info@ansi.org    8:30am – 6pm EST, Monday – Friday
ANSI Standards Store

Browse ISO Standards
Browse IEC Standards

View all Publishers





View All Standards Packages



Search tips Search tips

ISO/IEC 15946-5:2009

     

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems and digital signature mechanisms.

ISO/IEC 15946-5:2009 defines the elliptic curve generation techniques useful for implementing the mechanisms defined in ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, and ISO/IEC 18033-2.

The scope of ISO/IEC 15946-5:2009 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of ISO/IEC 15946-5:2009. ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with ISO/IEC 15946 will not be guaranteed.


Need more than one copy or have multiple people needing access,
an ANSI Site License Subscription may be the perfect solution.

Would you like to Email to a friend? If you would like to Email a friend a link to this item please    Login

Questions?