This Recommendation provides the specifications of key establishment schemes that are appropriate for use by the U.S. Federal Government, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: American National Standard (ANS) X9.42 Agreement of Symmetric Keys using Discrete Logarithm Cryptography and ANS X9.63 Key Agreement and Key Transport using Elliptic Curve Cryptography. A key establishment scheme can be characterized as either a key agreement scheme or a key transport scheme. The asymmetric-key-based key agreement schemes in this Recommendation are based on the Diffie-Hellman (DH) and Menezes-Qu-Vanstone (MQV) algorithms. In addition, an asymmetric-key-based key transport scheme is specified.
Cited By
- Dong J, Zheng F, Lin J, Liu Z, Xiao F and Fan G (2022). EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2, ACM Transactions on Embedded Computing Systems, 21:2, (1-25), Online publication date: 31-Mar-2022.
- Feiri M, Petit J and Kargl F Efficient and secure storage of private keys for pseudonymous vehicular communication Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles, (9-18)
- Yao A and Zhao Y OAKE Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (1113-1128)
- Cremers C Examining indistinguishability-based security models for key exchange protocols Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, (80-91)
- Oehler M, Phatak D and Krautheim J Visualizing your key for secure phone calls and language independence Proceedings of the Seventh International Symposium on Visualization for Cyber Security, (64-69)
- Aguilar Melchor C and Deswartes Y (2009). Trustable Relays for Anonymous Communication, Transactions on Data Privacy, 2:2, (101-130), Online publication date: 1-Aug-2009.