ISM-1761

When using ECDH for agreeing on encryption session keys, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.

Topic
Using Elliptic Curve Diffie-Hellman
Applicable to
Secret

History

Mar 2022
When using ECDH for agreeing on encryption session keys, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.
The existing table outlining cryptographic algorithms for use with High Assurance Cryptographic Equipment has been converted into discrete recommendations. Furthermore, the recommendation to give preference to the United State’s Commercial National Security Algorithm suite algorithms and key sizes (ISM-1232) has been rescinded in preference to including recommended key lengths for each individual algorithm.