Thanks for the reply Jakob. Is there a mapping in the government's elliptic curve names to the names in OpenSSL? For instance, the API EC_KEY_new_by_curve_name( int nid ) takes an id of the EC name where the id can be something like NID_X9_62_prime256v1, NID_X9_62_prime239v3, etc. that are defined in ob_jmac.h. What I would like to know is how the names are related to NIST's recommendation list?
Is there a convention?

Thanks

On 11/11/2015 1:08 PM, Jakob Bohm wrote:
On 11/11/2015 21:02, Alex Chen wrote:
I see there is a list of recommended list by NIST in http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf, but it is very old (1999) Is there a up to date list of elliptic curves approved or recommended for government use in OpenSSL?
Is NID_X9_62_prime256v1 the strongest?
First of all, it depends on *which government*, NIST is for
the USA Government only, though some allied countries may have
copied their decisions.

Secondly, since ca. 1999, the official list has been mostly
unchanged, namely those that are listed in the official NIST
standard FIPS 186-2 for use with ECDSA and in NIST Special
publication SP 800-56A for ECDH.

So far, the public adjustments have been:

2005: The official Suite B list of ciphers was published and
     included the P-256 and P-384 bit curves as minimum.
      Around the same time they made a secret Suite A list of
     ciphers for stuff more secret than "top secret".
2015: NSA announced that they will soon start work on a new
     list, and that government departments should not waste
     taxpayers money doing the upgrade to Suite B just a few
     years before it becomes obsolete.
      However for use at this time they recommend P-384 or
     3072 bit RSA/DH as a good minimum while accepting the
     next step down (P-256 or 2048 bit RSA/DH) in already
     built systems.
      They also recommend the use of pure symmetric key
     solutions with strong (256 random bits) keys as the best
     current solution where possible.

The (non-classified) current official advice can be read at

https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded


_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to