Skip to content
arrow_back
search
ISM-1762 policy ASD Information Security Manual (ISM)

Use NIST P-384 Curve for ECDH Keys

When using ECDH, utilise the NIST P-384 curve for better encryption security.

record_voice_over

Plain language

This control suggests using a special mathematical tool called the NIST P-384 curve to securely share secret keys over the internet. If this isn't done, sensitive information might be intercepted by hackers, leading to data breaches or financial losses.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

TS

ISM last updated

Feb 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using ECDH for agreeing on encryption session keys, NIST P-384 or P-521 curves are used, preferably the NIST P-384 curve.
policy ASD Information Security Manual (ISM) ISM-1762
priority_high

Why it matters

If ECDH uses curves other than NIST P-384/P-521, key agreement strength may drop, increasing risk of session key compromise and data exposure.

settings

Operational notes

Configure TLS/ECDH settings to prefer NIST P-384 (allow P-521) and disable weaker/unsupported curves; validate via scans and library policy.

Mapping detail

Mapping

Direction

Controls