Elliptic Curves for Security
draft-agl-cfrgcurve-00
Document | Type |
Replaced Internet-Draft
(cfrg RG)
Expired & archived
|
|
---|---|---|---|
Author | Adam Langley | ||
Last updated | 2015-10-14 (Latest revision 2015-01-06) | ||
Replaced by | draft-irtf-cfrg-curves | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | IRTF state | (None) | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Replaced by draft-irtf-cfrg-curves | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This memo describes an algorithm for deterministically generating parameters for elliptic curves over prime fields offering high practical security in cryptographic applications, including Transport Layer Security (TLS) and X.509 certificates. It also specifies a specific curve at the ~128-bit security level.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)