Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-56A Rev. 3 (DRAFT)

Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography

Date Published: August 2017
Comments Due: November 6, 2017 (public comment period is CLOSED)
Email Questions to: SP800-56a_comments@nist.gov

Author(s)

Elaine Barker (NIST), Lily Chen (NIST), Sharon Keller (NIST), Allen Roginsky (NIST), Apostol Vassilev (NIST), Richard Davis (NSA)

Announcement

NIST announces the public comment release of SP 800-56A Rev. 3 and SP 800-56C Rev. 1. SP 800-56A specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman (DH) and Menezes-Qu-Vanstone(MQV) key establishment schemes. Revision 3 approves the use of specific safe-prime groups of domain parameters for finite field DH and MQV schemes and requires the use of specific commonly used elliptic curves. In addition, all methods used for key derivation have been moved to SP 800-56C.

Abstract

Keywords

Diffie-Hellman; elliptic curve cryptography; finite field cryptography; key agreement; key confirmation; key derivation; key establishment; key transport; MQV.
Control Families

System and Communications Protection;

Documentation

Publication:
Draft SP 800-56A Rev. 3

Supplemental Material:
Comment Template (word)

Other Parts of this Publication:
SP 800-56B Rev. 1
SP 800-56C Rev. 1 (DRAFT)

Topics

Security and Privacy
key management