Skip to content
arrow_back
search
ISM-1761 policy ASD Information Security Manual (ISM)

Use NIST Curves for ECDH Encryption

Use specific NIST curves for secure encryption key exchanges, with P-384 preferred.

record_voice_over

Plain language

When we talk about securing sensitive communications online, it's a bit like making sure your personal diary is under lock and key. This control recommends using specific mathematical techniques (NIST curves) for protecting data exchanges, with a preference for one type called P-384. If these techniques are not used, there’s a heightened risk that hackers could intercept and understand sensitive information intended to be private.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

S

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using ECDH for agreeing on encryption session keys, NIST P-256, P-384 or P-521 curves are used, preferably the NIST P-384 curve.
policy ASD Information Security Manual (ISM) ISM-1761
priority_high

Why it matters

Using non‑NIST curves for ECDH can weaken key agreement, enabling attackers to derive session keys and decrypt sensitive traffic.

settings

Operational notes

Audit TLS/ECDH configurations so only NIST P‑256, P‑384 or P‑521 curves are enabled; prefer P‑384 and remove all others.

Mapping detail

Mapping

Direction

Controls