Skip to content
arrow_back
search
ISM-1446 policy ASD Information Security Manual (ISM)

Use Approved Elliptic Curves for Encryption

Ensure secure cryptography by using NIST-approved elliptic curves for encryption.

record_voice_over

Plain language

When using elliptic curve cryptography, it's important to choose the right mathematical curve to ensure data security. If you don't use curves approved by experts like those at NIST, your encrypted messages could be vulnerable to hackers who might steal sensitive information or cause financial harm.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Feb 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using elliptic curve cryptography, a suitable curve from NIST SP 800-186 is used.
policy ASD Information Security Manual (ISM) ISM-1446
priority_high

Why it matters

If non‑NIST SP 800‑186 curves are used, ECC may be weaker or noncompliant, enabling decryption, MITM attacks, or undetected data tampering.

settings

Operational notes

Restrict TLS/crypto configurations to NIST SP 800‑186 curves only; regularly audit libraries and settings to prevent non‑approved curve negotiation.

Mapping detail

Mapping

Direction

Controls