ISO/IEC 15946-5:2009

Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation

Publication date:   Dec 10, 2009

95.99 Withdrawal of Standard   Aug 11, 2017

General information

95.99 Withdrawal of Standard   Aug 11, 2017

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

  Withdrawn

PDF - €76.23

  English  



Buy

Scope

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems and digital signature mechanisms.
ISO/IEC 15946-5:2009 defines the elliptic curve generation techniques useful for implementing the mechanisms defined in ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, and ISO/IEC 18033-2.
The scope of ISO/IEC 15946-5:2009 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of ISO/IEC 15946-5:2009. ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with ISO/IEC 15946 will not be guaranteed.

Life cycle

NOW

WITHDRAWN
ISO/IEC 15946-5:2009
95.99 Withdrawal of Standard
Aug 11, 2017

CORRIGENDA / AMENDMENTS

WITHDRAWN
ISO/IEC 15946-5:2009/Cor 1:2012

REVISED BY

WITHDRAWN
ISO/IEC 15946-5:2017