Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

BS ISO/IEC 15946-5:2017

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

Information technology. Security techniques. Cryptographic techniques based on elliptic curves Elliptic curve generation
Available format(s)

Hardcopy , PDF

Superseded date

08-04-2022

Language(s)

English

Published date

18-09-2017

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and conversion functions
5 Framework for elliptic curve generation
6 Verifiably pseudo-random elliptic curve generation
7 Constructing elliptic curves by complex multiplication
8 Constructing elliptic curves by lifting
Annex A (informative) - Background information on elliptic
        curves
Annex B (informative) - Background information on elliptic
        curve cryptosystems
Annex C (informative) - Numerical examples
Annex D (informative) - Summary of properties of elliptic
        curves generated by the complex multiplication method
Bibliography

Describes public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.

The ISO/IEC15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC15946‑1 .

This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC29192‑4 , ISO/IEC9796‑3 , ISO/IEC11770‑3 , ISO/IEC14888‑3 and ISO/IEC18033‑2 .

This document is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).

The ISO/IEC15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC15946 series will not be guaranteed.

Committee
IST/33/2
DevelopmentNote
Supersedes 16/30335567 DC. (10/2017)
DocumentType
Standard
Pages
40
PublisherName
British Standards Institution
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 15946-5:2017 Identical

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information
$478.43
Including GST where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more