Elliptic Curves for Security
draft-agl-cfrgcurve-00
| Document | Type | Replaced Internet-Draft (cfrg RG) | |
|---|---|---|---|
| Author | Adam Langley | ||
| Last updated | 2015-10-14 (Latest revision 2015-01-06) | ||
| Replaced by | draft-irtf-cfrg-curves, RFC 7748 | ||
| Stream | Internet Research Task Force (IRTF) | ||
| Formats |
Expired & archived
plain text
xml
htmlized
pdfized
bibtex
|
||
| Stream | IRTF state | (None) | |
| Consensus boilerplate | Unknown | ||
| Document shepherd | (None) | ||
| IESG | IESG state | Replaced by draft-irtf-cfrg-curves, draft-irtf-cfrg-curves | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-agl-cfrgcurve-00.txt
https://www.ietf.org/archive/id/draft-agl-cfrgcurve-00.txt
Abstract
This memo describes an algorithm for deterministically generating parameters for elliptic curves over prime fields offering high practical security in cryptographic applications, including Transport Layer Security (TLS) and X.509 certificates. It also specifies a specific curve at the ~128-bit security level.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)