Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Historical

ISO/IEC 15946-5:2009

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems and digital signature mechanisms.

ISO/IEC 15946-5:2009 defines the elliptic curve generation techniques useful for implementing the mechanisms defined in ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, and ISO/IEC 18033-2.

The scope of ISO/IEC 15946-5:2009 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of ISO/IEC 15946-5:2009. ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with ISO/IEC 15946 will not be guaranteed.


Content Provider
International Organization for Standardization [iso]


Others Also Bought

Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers
Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions
Document History
Revised By:
Included in Packages
This standard is not included in any packages.
Amendments & Corrections
ANSI Logo

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.

CUSTOMER SERVICE
NEW YORK OFFICE
ANSI HEADQUARTERS