Skip to content
arrow_back
search
ISM-0474 policy ASD Information Security Manual (ISM)

Using Secure Elliptic Curve Diffie-Hellman Encryption

Use ECDH with a base point order and key size of at least 224 bits, preferably NIST P-384, for secure key agreements.

record_voice_over

Plain language

This control is about using a method called Elliptic Curve Diffie-Hellman (ECDH) to ensure that when confidential information is exchanged, it's done securely. Imagine if two people are sending secret messages to each other; this method helps keep their communication private. Without this, sensitive information could be exposed to unauthorised people, which might lead to data breaches or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using ECDH for agreeing on encryption session keys, a base point order and key size of at least 224 bits is used, preferably the NIST P-384 curve.
policy ASD Information Security Manual (ISM) ISM-0474
priority_high

Why it matters

Weak ECDH parameters (e.g., <224-bit or wrong base point order) can enable key recovery, allowing decryption and compromise of secure sessions, leading to data breaches and financial loss.

settings

Operational notes

Validate ECDH uses a base point order and key size of at least 224 bits; prefer NIST P-384. Regularly check crypto libraries/configs and test negotiated groups to prevent weak-curve use.

Mapping detail

Mapping

Direction

Controls