Date Published: February 2023
Planning Note (04/17/2023):
We've identified an issue in Sec. 3.2.2.1 that will be corrected in a future update/revision of this publication. For details, see the potential updates spreadsheet listed under "Documentation."
Author(s)
Lily Chen (NIST), Dustin Moody (NIST), Andrew Regenscheid (NIST), Angela Robinson (NIST), Karen Randall (Randall Consulting)
This Recommendation specifies the set of elliptic curves recommended for U.S. Government use. In addition to the previously recommended Weierstrass curves defined over prime fields and binary fields, this Recommendation includes two newly specified Edwards curves, which provide increased performance, side-channel resistance, and simpler implementation when compared to traditional curves. This Recommendation also specifies alternative representations for these new curves to allow more implementation flexibility. The new curves are interoperable with those specified by the Crypto Forum Research Group (CFRG) of the Internet Engineering Task Force (IETF).
This Recommendation specifies the set of elliptic curves recommended for U.S. Government use. In addition to the previously recommended Weierstrass curves defined over prime fields and binary fields, this Recommendation includes two newly specified Edwards curves, which provide increased...
See full abstract
This Recommendation specifies the set of elliptic curves recommended for U.S. Government use. In addition to the previously recommended Weierstrass curves defined over prime fields and binary fields, this Recommendation includes two newly specified Edwards curves, which provide increased performance, side-channel resistance, and simpler implementation when compared to traditional curves. This Recommendation also specifies alternative representations for these new curves to allow more implementation flexibility. The new curves are interoperable with those specified by the Crypto Forum Research Group (CFRG) of the Internet Engineering Task Force (IETF).
Hide full abstract
Keywords
computer security; discrete logarithm-based groups; domain parameters; elliptic curve cryptography
Control Families
System and Communications Protection