Skip to content
arrow_back
search
ISM-1629 policy ASD Information Security Manual (ISM)

Select Correct Modulus for Diffie-Hellman Encryption

Use NIST guidelines to choose secure parameters for Diffie-Hellman encryption to safely agree on session keys.

record_voice_over

Plain language

When it comes to discussing using Diffie-Hellman encryption, we're talking about a method to securely agree on a secret code or "key" to keep digital communications safe. Choosing the right numbers—known as a modulus and other parameters—is like making sure you have a safe with a strong lock. If you choose poorly, it's easier for someone to open that lock without a key and see your secrets.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using DH for agreeing on encryption session keys, a modulus and associated parameters are selected according to NIST SP 800-56A Rev. 3.
policy ASD Information Security Manual (ISM) ISM-1629
priority_high

Why it matters

Incorrect modulus selection in Diffie-Hellman can enable weak-key attacks, allowing decryption of sessions and exposure of sensitive data and communications.

settings

Operational notes

Verify DH modulus size and domain parameters match NIST SP 800-56A Rev. 3 approved groups; restrict configs to those groups and record periodic checks and any changes.

Mapping detail

Mapping

Direction

Controls