Page:Fips186-2-change1.pdf/30

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.
  • Normal Basis: Choose the Type T low-complexity normal basis with the smallest T.

For each binary field, the parameters are given for the above basis representations.


1.4 Choice of Curves

Two kinds of curves are given:

  • Pseudo-random curves are those whose coefficients are generated from the output of a seeded cryptographic hash. If the seed value is given along with the coefficients, it can be verified easily that the coefficients were indeed generated by that method.
  • Special curves whose coefficients and underlying field have been selected to optimize the efficiency of the elliptic curve operations.

For each size, the following curves are given:

  • A pseudo-random curve over GF(p).
  • A pseudo-random curve over GF(2m).
  • A special curve over GF(2m) called a Koblitz curve or anomalous binary curve.

The pseudo-random curves are generated via the SHA-1 based method given in the ANSI X9.62 and IEEE P1363 standards. (The generation and verification processes are given in Appendices 6-4 through 6-7.)


1.5 Choice of Base Points

27