URL: https://www.secg.org/sec1-v2.pdf
%PDF-1.4
5 0 obj
<< /S /GoTo /D (section.1) >>
endobj
8 0 obj
(Introduction)
endobj
9 0 obj
<< /S /GoTo /D (subsection.1.1) >>
endobj
12 0 obj
(Overview)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.2) >>
endobj
16 0 obj
(Aim)
endobj
17 0 obj
<< /S /GoTo /D (subsection.1.3) >>
endobj
20 0 obj
(Compliance)
endobj
21 0 obj
<< /S /GoTo /D (subsection.1.4) >>
endobj
24 0 obj
(Document Evolution)
endobj
25 0 obj
<< /S /GoTo /D (subsection.1.5) >>
endobj
28 0 obj
(Intellectual Property)
endobj
29 0 obj
<< /S /GoTo /D (subsection.1.6) >>
endobj
32 0 obj
(Organization)
endobj
33 0 obj
<< /S /GoTo /D (section.2) >>
endobj
36 0 obj
(Mathematical Foundations)
endobj
37 0 obj
<< /S /GoTo /D (subsection.2.1) >>
endobj
40 0 obj
(Finite Fields)
endobj
41 0 obj
<< /S /GoTo /D (subsubsection.2.1.1) >>
endobj
44 0 obj
(The Finite Field Fp)
endobj
45 0 obj
<< /S /GoTo /D (subsubsection.2.1.2) >>
endobj
48 0 obj
(The Finite Field F2m)
endobj
49 0 obj
<< /S /GoTo /D (subsection.2.2) >>
endobj
52 0 obj
(Elliptic Curves)
endobj
53 0 obj
<< /S /GoTo /D (subsubsection.2.2.1) >>
endobj
56 0 obj
(Elliptic Curves over Fp)
endobj
57 0 obj
<< /S /GoTo /D (subsubsection.2.2.2) >>
endobj
60 0 obj
(Elliptic Curves over F2m)
endobj
61 0 obj
<< /S /GoTo /D (subsection.2.3) >>
endobj
64 0 obj
(Data Types and Conversions)
endobj
65 0 obj
<< /S /GoTo /D (subsubsection.2.3.1) >>
endobj
68 0 obj
(Bit-String-to-Octet-String Conversion)
endobj
69 0 obj
<< /S /GoTo /D (subsubsection.2.3.2) >>
endobj
72 0 obj
(Octet-String-to-Bit-String Conversion)
endobj
73 0 obj
<< /S /GoTo /D (subsubsection.2.3.3) >>
endobj
76 0 obj
(Elliptic-Curve-Point-to-Octet-String Conversion)
endobj
77 0 obj
<< /S /GoTo /D (subsubsection.2.3.4) >>
endobj
80 0 obj
(Octet-String-to-Elliptic-Curve-Point Conversion)
endobj
81 0 obj
<< /S /GoTo /D (subsubsection.2.3.5) >>
endobj
84 0 obj
(Field-Element-to-Octet-String Conversion)
endobj
85 0 obj
<< /S /GoTo /D (subsubsection.2.3.6) >>
endobj
88 0 obj
(Octet-String-to-Field-Element Conversion)
endobj
89 0 obj
<< /S /GoTo /D (subsubsection.2.3.7) >>
endobj
92 0 obj
(Integer-to-Octet-String Conversion)
endobj
93 0 obj
<< /S /GoTo /D (subsubsection.2.3.8) >>
endobj
96 0 obj
(Octet-String-to-Integer Conversion)
endobj
97 0 obj
<< /S /GoTo /D (subsubsection.2.3.9) >>
endobj
100 0 obj
(Field-Element-to-Integer Conversion)
endobj
101 0 obj
<< /S /GoTo /D (section.3) >>
endobj
104 0 obj
(Cryptographic Components)
endobj
105 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
108 0 obj
(Elliptic Curve Domain Parameters)
endobj
109 0 obj
<< /S /GoTo /D (subsubsection.3.1.1) >>
endobj
112 0 obj
(Elliptic Curve Domain Parameters over Fp)
endobj
113 0 obj
<< /S /GoTo /D (subsubsection.3.1.2) >>
endobj
116 0 obj
(Elliptic Curve Domain Parameters over F2m)
endobj
117 0 obj
<< /S /GoTo /D (subsubsection.3.1.3) >>
endobj
120 0 obj
(Verifiably Random Curves and Base Point Generators)
endobj
121 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
124 0 obj
(Elliptic Curve Key Pairs)
endobj
125 0 obj
<< /S /GoTo /D (subsubsection.3.2.1) >>
endobj
128 0 obj
(Elliptic Curve Key Pair Generation Primitive)
endobj
129 0 obj
<< /S /GoTo /D (subsubsection.3.2.2) >>
endobj
132 0 obj
(Validation of Elliptic Curve Public Keys)
endobj
133 0 obj
<< /S /GoTo /D (subsubsection.3.2.3) >>
endobj
136 0 obj
(Partial Validation of Elliptic Curve Public Keys)
endobj
137 0 obj
<< /S /GoTo /D (subsubsection.3.2.4) >>
endobj
140 0 obj
(Verifiable and Assisted Key Pair Generation and Validation)
endobj
141 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
144 0 obj
(Elliptic Curve Diffie-Hellman Primitives)
endobj
145 0 obj
<< /S /GoTo /D (subsubsection.3.3.1) >>
endobj
148 0 obj
(Elliptic Curve Diffie-Hellman Primitive)
endobj
149 0 obj
<< /S /GoTo /D (subsubsection.3.3.2) >>
endobj
152 0 obj
(Elliptic Curve Cofactor Diffie-Hellman Primitive)
endobj
153 0 obj
<< /S /GoTo /D (subsection.3.4) >>
endobj
156 0 obj
(Elliptic Curve MQV Primitive)
endobj
157 0 obj
<< /S /GoTo /D (subsection.3.5) >>
endobj
160 0 obj
(Hash Functions)
endobj
161 0 obj
<< /S /GoTo /D (subsection.3.6) >>
endobj
164 0 obj
(Key Derivation Functions)
endobj
165 0 obj
<< /S /GoTo /D (subsubsection.3.6.1) >>
endobj
168 0 obj
(ANS X9.63 Key Derivation Function)
endobj
169 0 obj
<< /S /GoTo /D (subsection.3.7) >>
endobj
172 0 obj
(MAC schemes)
endobj
173 0 obj
<< /S /GoTo /D (subsubsection.3.7.1) >>
endobj
176 0 obj
(Scheme Setup)
endobj
177 0 obj
<< /S /GoTo /D (subsubsection.3.7.2) >>
endobj
180 0 obj
(Key Deployment)
endobj
181 0 obj
<< /S /GoTo /D (subsubsection.3.7.3) >>
endobj
184 0 obj
(Tagging Operation)
endobj
185 0 obj
<< /S /GoTo /D (subsubsection.3.7.4) >>
endobj
188 0 obj
(Tag Checking Operation)
endobj
189 0 obj
<< /S /GoTo /D (subsection.3.8) >>
endobj
192 0 obj
(Symmetric Encryption Schemes)
endobj
193 0 obj
<< /S /GoTo /D (subsubsection.3.8.1) >>
endobj
196 0 obj
(Scheme Setup)
endobj
197 0 obj
<< /S /GoTo /D (subsubsection.3.8.2) >>
endobj
200 0 obj
(Key Deployment)
endobj
201 0 obj
<< /S /GoTo /D (subsubsection.3.8.3) >>
endobj
204 0 obj
(Encryption Operation)
endobj
205 0 obj
<< /S /GoTo /D (subsubsection.3.8.4) >>
endobj
208 0 obj
(Decryption Operation)
endobj
209 0 obj
<< /S /GoTo /D (subsection.3.9) >>
endobj
212 0 obj
(Key Wrap Schemes)
endobj
213 0 obj
<< /S /GoTo /D (subsubsection.3.9.1) >>
endobj
216 0 obj
(Key Wrap Scheme Setup)
endobj
217 0 obj
<< /S /GoTo /D (subsubsection.3.9.2) >>
endobj
220 0 obj
(Key Wrap Schemes Key Generation)
endobj
221 0 obj
<< /S /GoTo /D (subsubsection.3.9.3) >>
endobj
224 0 obj
(Key Wrap Schemes Wrap Operation)
endobj
225 0 obj
<< /S /GoTo /D (subsubsection.3.9.4) >>
endobj
228 0 obj
(Key Wrap Schemes Unwrap Operation)
endobj
229 0 obj
<< /S /GoTo /D (subsection.3.10) >>
endobj
232 0 obj
(Random Number Generation)
endobj
233 0 obj
<< /S /GoTo /D (subsubsection.3.10.1) >>
endobj
236 0 obj
(Entropy)
endobj
237 0 obj
<< /S /GoTo /D (subsubsection.3.10.2) >>
endobj
240 0 obj
(Deterministic Generation of Pseudorandom Bit Strings)
endobj
241 0 obj
<< /S /GoTo /D (subsubsection.3.10.3) >>
endobj
244 0 obj
(Converting Random Bit Strings to Random Numbers)
endobj
245 0 obj
<< /S /GoTo /D (subsection.3.11) >>
endobj
248 0 obj
(Security Levels and Protection Lifetimes)
endobj
249 0 obj
<< /S /GoTo /D (section.4) >>
endobj
252 0 obj
(Signature Schemes)
endobj
253 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
256 0 obj
(Elliptic Curve Digital Signature Algorithm)
endobj
257 0 obj
<< /S /GoTo /D (subsubsection.4.1.1) >>
endobj
260 0 obj
(Scheme Setup)
endobj
261 0 obj
<< /S /GoTo /D (subsubsection.4.1.2) >>
endobj
264 0 obj
(Key Deployment)
endobj
265 0 obj
<< /S /GoTo /D (subsubsection.4.1.3) >>
endobj
268 0 obj
(Signing Operation)
endobj
269 0 obj
<< /S /GoTo /D (subsubsection.4.1.4) >>
endobj
272 0 obj
(Verifying Operation)
endobj
273 0 obj
<< /S /GoTo /D (subsubsection.4.1.5) >>
endobj
276 0 obj
(Alternative Verifying Operation)
endobj
277 0 obj
<< /S /GoTo /D (subsubsection.4.1.6) >>
endobj
280 0 obj
(Public Key Recovery Operation)
endobj
281 0 obj
<< /S /GoTo /D (subsubsection.4.1.7) >>
endobj
284 0 obj
(Self-Signing Operation)
endobj
285 0 obj
<< /S /GoTo /D (section.5) >>
endobj
288 0 obj
(Encryption and Key Transport Schemes)
endobj
289 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
292 0 obj
(Elliptic Curve Integrated Encryption Scheme)
endobj
293 0 obj
<< /S /GoTo /D (subsubsection.5.1.1) >>
endobj
296 0 obj
(Scheme Setup)
endobj
297 0 obj
<< /S /GoTo /D (subsubsection.5.1.2) >>
endobj
300 0 obj
(Key Deployment)
endobj
301 0 obj
<< /S /GoTo /D (subsubsection.5.1.3) >>
endobj
304 0 obj
(Encryption Operation)
endobj
305 0 obj
<< /S /GoTo /D (subsubsection.5.1.4) >>
endobj
308 0 obj
(Decryption Operation)
endobj
309 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
312 0 obj
(Wrapped Key Transport Scheme)
endobj
313 0 obj
<< /S /GoTo /D (section.6) >>
endobj
316 0 obj
(Key Agreement Schemes)
endobj
317 0 obj
<< /S /GoTo /D (subsection.6.1) >>
endobj
320 0 obj
(Elliptic Curve Diffie-Hellman Scheme)
endobj
321 0 obj
<< /S /GoTo /D (subsubsection.6.1.1) >>
endobj
324 0 obj
(Scheme Setup)
endobj
325 0 obj
<< /S /GoTo /D (subsubsection.6.1.2) >>
endobj
328 0 obj
(Key Deployment)
endobj
329 0 obj
<< /S /GoTo /D (subsubsection.6.1.3) >>
endobj
332 0 obj
(Key Agreement Operation)
endobj
333 0 obj
<< /S /GoTo /D (subsection.6.2) >>
endobj
336 0 obj
(Elliptic Curve MQV Scheme)
endobj
337 0 obj
<< /S /GoTo /D (subsubsection.6.2.1) >>
endobj
340 0 obj
(Scheme Setup)
endobj
341 0 obj
<< /S /GoTo /D (subsubsection.6.2.2) >>
endobj
344 0 obj
(Key Deployment)
endobj
345 0 obj
<< /S /GoTo /D (subsubsection.6.2.3) >>
endobj
348 0 obj
(Key Agreement Operation)
endobj
349 0 obj
<< /S /GoTo /D (section.A) >>
endobj
352 0 obj
(Glossary)
endobj
353 0 obj
<< /S /GoTo /D (subsection.A.1) >>
endobj
356 0 obj
(Terms)
endobj
357 0 obj
<< /S /GoTo /D (subsection.A.2) >>
endobj
360 0 obj
(Acronyms, Initialisms and Other Abbreviations)
endobj
361 0 obj
<< /S /GoTo /D (subsection.A.3) >>
endobj
364 0 obj
(Notation)
endobj
365 0 obj
<< /S /GoTo /D (section.B) >>
endobj
368 0 obj
(Commentary)
endobj
369 0 obj
<< /S /GoTo /D (subsection.B.1) >>
endobj
372 0 obj
(Commentary on Section 2 --- Mathematical Foundations)
endobj
373 0 obj
<< /S /GoTo /D (subsection.B.2) >>
endobj
376 0 obj
(Commentary on Section 3 --- Cryptographic Components)
endobj
377 0 obj
<< /S /GoTo /D (subsubsection.B.2.1) >>
endobj
380 0 obj
(Commentary on Elliptic Curve Domain Parameters)
endobj
381 0 obj
<< /S /GoTo /D (subsubsection.B.2.2) >>
endobj
384 0 obj
(Commentary on Elliptic Curve Key Pairs)
endobj
385 0 obj
<< /S /GoTo /D (subsubsection.B.2.3) >>
endobj
388 0 obj
(Commentary on Elliptic Curve Diffie-Hellman Primitives)
endobj
389 0 obj
<< /S /GoTo /D (subsubsection.B.2.4) >>
endobj
392 0 obj
(Commentary on the Elliptic Curve MQV Primitive)
endobj
393 0 obj
<< /S /GoTo /D (subsubsection.B.2.5) >>
endobj
396 0 obj
(Commentary on Hash Functions)
endobj
397 0 obj
<< /S /GoTo /D (subsubsection.B.2.6) >>
endobj
400 0 obj
(Commentary on Key Derivation Functions)
endobj
401 0 obj
<< /S /GoTo /D (subsubsection.B.2.7) >>
endobj
404 0 obj
(Commentary on MAC Schemes)
endobj
405 0 obj
<< /S /GoTo /D (subsubsection.B.2.8) >>
endobj
408 0 obj
(Commentary on Symmetric Encryption Schemes)
endobj
409 0 obj
<< /S /GoTo /D (subsubsection.B.2.9) >>
endobj
412 0 obj
(Commentary on Key Wrap Schemes)
endobj
413 0 obj
<< /S /GoTo /D (subsubsection.B.2.10) >>
endobj
416 0 obj
(Commentary on Random Number Generation)
endobj
417 0 obj
<< /S /GoTo /D (subsubsection.B.2.11) >>
endobj
420 0 obj
(Commentary on Security Levels and Protection Lifetimes)
endobj
421 0 obj
<< /S /GoTo /D (subsection.B.3) >>
endobj
424 0 obj
(Commentary on Section 4 --- Signature Schemes)
endobj
425 0 obj
<< /S /GoTo /D (subsubsection.B.3.1) >>
endobj
428 0 obj
(Commentary on the Elliptic Curve Digital Signature Algorithm)
endobj
429 0 obj
<< /S /GoTo /D (subsection.B.4) >>
endobj
432 0 obj
(Commentary on Section 5 --- Encryption Schemes)
endobj
433 0 obj
<< /S /GoTo /D (subsubsection.B.4.1) >>
endobj
436 0 obj
(Commentary on the Elliptic Curve Integrated Encryption Scheme)
endobj
437 0 obj
<< /S /GoTo /D (subsubsection.B.4.2) >>
endobj
440 0 obj
(Commentary on Wrapped Key Transport Scheme)
endobj
441 0 obj
<< /S /GoTo /D (subsection.B.5) >>
endobj
444 0 obj
(Commentary on Section 6 --- Key Agreement Schemes)
endobj
445 0 obj
<< /S /GoTo /D (subsubsection.B.5.1) >>
endobj
448 0 obj
(Commentary on the Elliptic Curve Diffie-Hellman Scheme)
endobj
449 0 obj
<< /S /GoTo /D (subsubsection.B.5.2) >>
endobj
452 0 obj
(Commentary on the Elliptic Curve MQV Scheme)
endobj
453 0 obj
<< /S /GoTo /D (subsection.B.6) >>
endobj
456 0 obj
(Alignment with Other Standards)
endobj
457 0 obj
<< /S /GoTo /D (section.C) >>
endobj
460 0 obj
(ASN.1 for Elliptic Curve Cryptography)
endobj
461 0 obj
<< /S /GoTo /D (subsection.C.1) >>
endobj
464 0 obj
(Syntax for Finite Fields)
endobj
465 0 obj
<< /S /GoTo /D (subsection.C.2) >>
endobj
468 0 obj
(Syntax for Elliptic Curve Domain Parameters)
endobj
469 0 obj
<< /S /GoTo /D (subsection.C.3) >>
endobj
472 0 obj
(Syntax for Elliptic Curve Public Keys)
endobj
473 0 obj
<< /S /GoTo /D (subsection.C.4) >>
endobj
476 0 obj
(Syntax for Elliptic Curve Private Keys)
endobj
477 0 obj
<< /S /GoTo /D (subsection.C.5) >>
endobj
480 0 obj
(Syntax for Signature and Key Establishment Schemes)
endobj
481 0 obj
<< /S /GoTo /D (subsection.C.6) >>
endobj
484 0 obj
(Syntax for Key Derivation Functions)
endobj
485 0 obj
<< /S /GoTo /D (subsection.C.7) >>
endobj
488 0 obj
(Protocol Data Unit Syntax)
endobj
489 0 obj
<< /S /GoTo /D (subsection.C.8) >>
endobj
492 0 obj
(ASN.1 Module)
endobj
493 0 obj
<< /S /GoTo /D (section*.4) >>
endobj
496 0 obj
(References)
endobj
497 0 obj
<< /S /GoTo /D [498 0 R /FitH ] >>
endobj
500 0 obj <<
/Length 650
/Filter /FlateDecode
>>
stream
x�mSMo�0��W;I@���,Y;
Ͳ��]�`�u�v�8n�����]�C/6%~��H�fw���v>X��F�>8��]�K��*Y��V֪9�gU�Xɽ�N��{r�7}7�|��(��4�S}:��o�Y
kt�G�"h �"�L��`c%`�O��&������4�
�6Oӳ�Qvttr��)c�A4k
?(��p�6ym�(AWƧ��&�?>bIL�ѝ�zj�@D�4����:�����nf�[E#��C��B�����&w�G��;���)
u՛��RW!Ea2Z�����D�������������{��m"p5�f
�"U�(��%�A����3�X������5Ą����Ý�ğ��4z&�'RYl̥�*7 08�y#��b��H�c�r��C�y��ً�hg�9�ɲ�A�(����ةkd�鯎�ȟ�2����ʭB�o��a��q�<���(N�V��t{�A���b�"�>�Q�@�3���ģfOײ�K��gbޮ���}�@.�l�s���kp�݃�w7�+G��e-������[���@��3Kj��{�v�|�T2�}4M����N״�����xd㱞����ӥ�q��Z Oݾ�^G��|��y�W���?u$7Sendstream
endobj
498 0 obj <<
/Type /Page
/Contents 500 0 R
/Resources 499 0 R
/MediaBox [0 0 612 792]
/Parent 521 0 R
>> endobj
501 0 obj <<
/D [498 0 R /XYZ 55.7908 740.1942 null]
>> endobj
502 0 obj <<
/D [498 0 R /XYZ 55.7908 728.2391 null]
>> endobj
499 0 obj <<
/Font << /F27 505 0 R /F25 508 0 R /F26 511 0 R /F38 514 0 R /F39 517 0 R /F40 520 0 R >>
/ProcSet [ /PDF /Text ]
>> endobj
524 0 obj <<
/Length 1349
/Filter /FlateDecode
>>
stream
x��Ks�F��|
��&�~c�S�Tj71����ڪB�������Xg7�K��y4���=��W��7�D� #�Ɵ"!�2XG�s$������h�������'���%)g"�'�o��D���$�@C�hR�|����Go1�E�:chTƈ͛3�����͌i3eڞ��>?gQ�����HD53n�*!�