2019
DOI: 10.6028/nist.sp.800-186-draft
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Recommendations for Discrete-Logarithm Based Cryptography:

Abstract: This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercis… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(9 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Next, we choose the minimum standardized curves slightly over the computed ideal size, such as NIST curves defined in NIST SP 800-186 [6] and standard Pairing-Friendly Curves [23]. As a consequence, the signature/key size based on a standardized curves are generally slightly larger than in an ideal setting where the choice of groups is not constrained.…”
Section: Tight Securitymentioning
confidence: 99%
“…Next, we choose the minimum standardized curves slightly over the computed ideal size, such as NIST curves defined in NIST SP 800-186 [6] and standard Pairing-Friendly Curves [23]. As a consequence, the signature/key size based on a standardized curves are generally slightly larger than in an ideal setting where the choice of groups is not constrained.…”
Section: Tight Securitymentioning
confidence: 99%
“…Moreover, in any electronic contract signing, designers and developers should consider legal regulations, but it is outside the scope of this paper. We use the ECDSA (Elliptic Curve Digital Signature Algorithm) signature scheme [20], the same used by Ethereum for signing transactions. The security level ("a number associated with the amount of work (the number of operations) that is required to break a cryptographic algorithm or system" [21]) recommended today [22,23] is at least 112 bits, equivalent to a 224-bit key for ECDSA.…”
Section: Smart Contract Specificationmentioning
confidence: 99%
“…Recommended elliptic curves for Federal Government use of ECDSA (including deterministic ECDSA) are provided in NIST Special Publication (SP) 800-186 [30].…”
Section: Introductionmentioning
confidence: 99%
“…FIPS 186-5 approves the use of EdDSA and specifies additional requirements. Recommended elliptic curves for Federal Government use of EdDSA are provided in SP 800-186 [30].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation