Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Elliptic Curves for Security (RFC7748)

IP.com Disclosure Number: IPCOM000245096D
Original Publication Date: 2016-Jan-01
Included in the Prior Art Database: 2016-Feb-08
Document File: 44 page(s) / 40K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

A. Langley: AUTHOR [+3]

Abstract

Since the initial standardization of Elliptic Curve Cryptography (ECC [RFC6090]) in [SEC1], there has been significant progress related to both efficiency and security of curves and implementations. Notable examples are algorithms protected against certain side-channel attacks, various "special" prime shapes that allow faster modular arithmetic, and a larger set of curve models from which to choose. There is also concern in the community regarding the generation and potential weaknesses of the curves defined by NIST [NIST].

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 7% of the total text.

Internet Research Task Force (IRTF)                           A. Langley Request for Comments: 7748                                        Google Category: Informational                                       M. Hamburg ISSN: 2070-1721                             Rambus Cryptography Research                                                                S. Turner                                                                    sn3rd                                                             January 2016

                       Elliptic Curves for Security

Abstract

   This memo specifies two elliptic curves over prime fields that offer    a high level of practical security in cryptographic applications,    including Transport Layer Security (TLS).  These curves are intended    to operate at the ~128-bit and ~224-bit security level, respectively,    and are generated deterministically based on a list of required    properties.

Status of This Memo

   This document is not an Internet Standards Track specification; it is    published for informational purposes.

   This document is a product of the Internet Research Task Force    (IRTF).  The IRTF publishes the results of Internet-related research    and development activities.  These results might not be suitable for    deployment.  This RFC represents the consensus of the Crypto Forum    Research Group of the Internet Research Task Force (IRTF).  Documents    approved for publication by the IRSG are not a candidate for any    level of Internet Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7748.

Copyright Notice

   Copyright (c) 2016 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.

Langley, et al.               Informational                     [Page 1]
 RFC 7748              Elliptic Curves for Security          January 2016

 Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2

   2.  Requirements Language . . . . . . . . . . . . . . . . . . . .   3

   3.  Not...