Diffie-Hellman exchange总结

Diffie-Hellman Group

DHGroup

PFSGroup

Key length

1

DHGroup1

PFS1

768-bit MODP

2

DHGroup2

PFS2

1024-bit MODP

14

DHGroup14

DHGroup2048

PFS2048

2048-bit MODP

19

ECP256

ECP256

256-bit ECP

20

ECP384

ECP384

384-bit ECP

24

DHGroup24

PFS24

2048-bit MODP

RFC 2409 The Internet Key Exchange (IKE)

768-bit MODP   //6.1 First Oakley Default Group

1024-bit MODP //6.2 Second Oakley Group

EC2N group on GP[2^155]

EC2N group on GP[2^185]

RFC 3526

More Modular Exponential (MODP) Diffie-Hellman groups  for Internet Key Exchange (IKE)

1536-bit MODP Group

2048-bit MODP Group

3072-bit MODP Group

4096-bit MODP Group

6144-bit MODP Group

8192-bit MODP Group

RFC 5114 Additional Diffie-Hellman Groups for Use with IETF Standards

1024-bit MODP Group with 160-bit Prime Order Subgroup

2048-bit MODP Group with 224-bit Prime Order Subgroup

2048-bit MODP Group with 256-bit Prime Order Subgroup

192-bit Random ECP Group

224-bit Random ECP Group

256-bit Random ECP Group

384-bit Random ECP Group

521-bit Random ECP Group

RFC 2409  The Internet Key Exchange (IKE)

default 768-bit MODP group


      The prime is: 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 }
      Its hexadecimal value is

         FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
         29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
         EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
         E485B576 625E7EC6 F44C42E9 A63A3620 FFFFFFFF FFFFFFFF

The generator is: 2.

alternate 1024-bit MODP group

   The prime is 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 }.
   Its hexadecimal value is

         FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
         29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
         EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
         E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
         EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE65381
         FFFFFFFF FFFFFFFF

The generator is 2 (decimal)

EC2N group on GP[2^155]

IKE implementations SHOULD support a EC2N group with the following
   characteristics. This group is assigned id 3 (three). The curve is
   based on the Galois Field GF[2^155]. The field size is 155. The
   irreducible polynomial for the field is:
          u^155 + u^62 + 1.
   The equation for the elliptic curve is:
           y^2 + xy = x^3 + ax^2 + b.

Field Size:                         155
   Group Prime/Irreducible Polynomial:
                    0x0800000000000000000000004000000000000001
   Group Generator One:         0x7b
   Group Curve A:                      0x0
   Group Curve B:                      0x07338f

Group Order: 0X0800000000000000000057db5698537193aef944

来自 <RFC 2409: The Internet Key Exchange (IKE)>

2.  1536-bit MODP Group

The 1536 bit MODP group has been used for the implementations for
   quite a long time, but was not defined in RFC 2409 (IKE).
   Implementations have been using group 5 to designate this group, we
   standardize that practice here.

The prime is: 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
      29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
      EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
      E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
      EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D
      C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F
      83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
      670C354E 4ABC9804 F1746C08 CA237327 FFFFFFFF FFFFFFFF

The generator is: 2.

3.  2048-bit MODP Group

This group is assigned id 14.

This prime is: 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
      29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
      EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
      E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
      EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D
      C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F
      83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
      670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B
      E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9
      DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510
      15728E5A 8AACAA68 FFFFFFFF FFFFFFFF

The generator is: 2.

来自 <RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)>


4.  3072-bit MODP Group

This group is assigned id 15.

This prime is: 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
      29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
      EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
      E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
      EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D
      C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F
      83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
      670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B
      E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9
      DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510
      15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64
      ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7
      ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B
      F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C
      BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31
      43DB5BFC E0FD108E 4B82D120 A93AD2CA FFFFFFFF FFFFFFFF

The generator is: 2.

来自 <RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)>


5.  4096-bit MODP Group

This group is assigned id 16.

This prime is: 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
      29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
      EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
      E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
      EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D
      C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F
      83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
      670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B
      E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9
      DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510
      15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64
      ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7
      ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B
      F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C
      BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31
      43DB5BFC E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7
      88719A10 BDBA5B26 99C32718 6AF4E23C 1A946834 B6150BDA
      2583E9CA 2AD44CE8 DBBBC2DB 04DE8EF9 2E8EFC14 1FBECAA6
      287C5947 4E6BC05D 99B2964F A090C3A2 233BA186 515BE7ED
      1F612970 CEE2D7AF B81BDD76 2170481C D0069127 D5B05AA9
      93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34063199
      FFFFFFFF FFFFFFFF

The generator is: 2.

来自 <RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)>

6.  6144-bit MODP Group

This group is assigned id 17.

This prime is: 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1 29024E08
   8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD EF9519B3 CD3A431B
   302B0A6D F25F1437 4FE1356D 6D51C245 E485B576 625E7EC6 F44C42E9
   A637ED6B 0BFF5CB6 F406B7ED EE386BFB 5A899FA5 AE9F2411 7C4B1FE6
   49286651 ECE45B3D C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8
   FD24CF5F 83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
   670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B E39E772C
   180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9 DE2BCBF6 95581718
   3995497C EA956AE5 15D22618 98FA0510 15728E5A 8AAAC42D AD33170D
   04507A33 A85521AB DF1CBA64 ECFB8504 58DBEF0A 8AEA7157 5D060C7D
   B3970F85 A6E1E4C7 ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226
   1AD2EE6B F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C
   BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31 43DB5BFC
   E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7 88719A10 BDBA5B26
   99C32718 6AF4E23C 1A946834 B6150BDA 2583E9CA 2AD44CE8 DBBBC2DB
   04DE8EF9 2E8EFC14 1FBECAA6 287C5947 4E6BC05D 99B2964F A090C3A2
   233BA186 515BE7ED 1F612970 CEE2D7AF B81BDD76 2170481C D0069127
   D5B05AA9 93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34028492
   36C3FAB4 D27C7026 C1D4DCB2 602646DE C9751E76 3DBA37BD F8FF9406
   AD9E530E E5DB382F 413001AE B06A53ED 9027D831 179727B0 865A8918
   DA3EDBEB CF9B14ED 44CE6CBA CED4BB1B DB7F1447 E6CC254B 33205151
   2BD7AF42 6FB8F401 378CD2BF 5983CA01 C64B92EC F032EA15 D1721D03
   F482D7CE 6E74FEF6 D55E702F 46980C82 B5A84031 900B1C9E 59E7C97F
   BEC7E8F3 23A97A7E 36CC88BE 0F1D45B7 FF585AC5 4BD407B2 2B4154AA
   CC8F6D7E BF48E1D8 14CC5ED2 0F8037E0 A79715EE F29BE328 06A1D58B
   B7C5DA76 F550AA3D 8A1FBFF0 EB19CCB1 A313D55C DA56C9EC 2EF29632
   387FE8D7 6E3C0468 043E8F66 3F4860EE 12BF2D5B 0B7474D6 E694F91E
   6DCC4024 FFFFFFFF FFFFFFFF

The generator is: 2.

7.  8192-bit MODP Group

This group is assigned id 18.

This prime is: 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 }

Its hexadecimal value is:

FFFFFFFF FFFFFFFF C90FDAA2 2168C234 C4C6628B 80DC1CD1
      29024E08 8A67CC74 020BBEA6 3B139B22 514A0879 8E3404DD
      EF9519B3 CD3A431B 302B0A6D F25F1437 4FE1356D 6D51C245
      E485B576 625E7EC6 F44C42E9 A637ED6B 0BFF5CB6 F406B7ED
      EE386BFB 5A899FA5 AE9F2411 7C4B1FE6 49286651 ECE45B3D
      C2007CB8 A163BF05 98DA4836 1C55D39A 69163FA8 FD24CF5F
      83655D23 DCA3AD96 1C62F356 208552BB 9ED52907 7096966D
      670C354E 4ABC9804 F1746C08 CA18217C 32905E46 2E36CE3B
      E39E772C 180E8603 9B2783A2 EC07A28F B5C55DF0 6F4C52C9
      DE2BCBF6 95581718 3995497C EA956AE5 15D22618 98FA0510
      15728E5A 8AAAC42D AD33170D 04507A33 A85521AB DF1CBA64
      ECFB8504 58DBEF0A 8AEA7157 5D060C7D B3970F85 A6E1E4C7
      ABF5AE8C DB0933D7 1E8C94E0 4A25619D CEE3D226 1AD2EE6B
      F12FFA06 D98A0864 D8760273 3EC86A64 521F2B18 177B200C
      BBE11757 7A615D6C 770988C0 BAD946E2 08E24FA0 74E5AB31
      43DB5BFC E0FD108E 4B82D120 A9210801 1A723C12 A787E6D7
      88719A10 BDBA5B26 99C32718 6AF4E23C 1A946834 B6150BDA
      2583E9CA 2AD44CE8 DBBBC2DB 04DE8EF9 2E8EFC14 1FBECAA6
      287C5947 4E6BC05D 99B2964F A090C3A2 233BA186 515BE7ED
      1F612970 CEE2D7AF B81BDD76 2170481C D0069127 D5B05AA9
      93B4EA98 8D8FDDC1 86FFB7DC 90A6C08F 4DF435C9 34028492
      36C3FAB4 D27C7026 C1D4DCB2 602646DE C9751E76 3DBA37BD
      F8FF9406 AD9E530E E5DB382F 413001AE B06A53ED 9027D831
      179727B0 865A8918 DA3EDBEB CF9B14ED 44CE6CBA CED4BB1B
      DB7F1447 E6CC254B 33205151 2BD7AF42 6FB8F401 378CD2BF
      5983CA01 C64B92EC F032EA15 D1721D03 F482D7CE 6E74FEF6
      D55E702F 46980C82 B5A84031 900B1C9E 59E7C97F BEC7E8F3
      23A97A7E 36CC88BE 0F1D45B7 FF585AC5 4BD407B2 2B4154AA
      CC8F6D7E BF48E1D8 14CC5ED2 0F8037E0 A79715EE F29BE328
      06A1D58B B7C5DA76 F550AA3D 8A1FBFF0 EB19CCB1 A313D55C
      DA56C9EC 2EF29632 387FE8D7 6E3C0468 043E8F66 3F4860EE
      12BF2D5B 0B7474D6 E694F91E 6DBE1159 74A3926F 12FEE5E4
      38777CB6 A932DF8C D8BEC4D0 73B931BA 3BC832B6 8D9DD300
      741FA7BF 8AFC47ED 2576F693 6BA42466 3AAB639C 5AE4F568
      3423B474 2BF1C978 238F16CB E39D652D E3FDB8BE FC848AD9
      22222E04 A4037C07 13EB57A8 1A23F0C7 3473FC64 6CEA306B
      4BCBC886 2F8385DD FA9D4B7F A2C087E8 79683303 ED5BDD3A
      062B3CF5 B3A278A6 6D2A13F8 3F44F82D DF310EE0 74AB6A36
      4597E899 A0255DC1 64F31CC5 0846851D F9AB4819 5DED7EA1
      B1D510BD 7EE74D73 FAF36BC3 1ECFA268 359046F4 EB879F92
      4009438B 481C6CD7 889A002E D5EE382B C9190DA6 FC026E47
      9558E447 5677E9AA 9E3050E2 765694DF C81F56E8 80B96E71
      60C980DD 98EDD3DF FFFFFFFF FFFFFFFF

The generator is: 2.

来自 <RFC 3526: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)>

2.1.  1024-bit MODP Group with 160-bit Prime Order Subgroup

The hexadecimal value of the prime is:

p = B10B8F96 A080E01D DE92DE5E AE5D54EC 52C99FBC FB06A3C6
       9A6A9DCA 52D23B61 6073E286 75A23D18 9838EF1E 2EE652C0
       13ECB4AE A9061123 24975C3C D49B83BF ACCBDD7D 90C4BD70
       98488E9C 219A7372 4EFFD6FA E5644738 FAA31A4F F55BCCC0
       A151AF5F 0DC8B4BD 45BF37DF 365C1A65 E68CFDA7 6D4DA708
       DF1FB2BC 2E4A4371

The hexadecimal value of the generator is:

g = A4D1CBD5 C3FD3412 6765A442 EFB99905 F8104DD2 58AC507F
       D6406CFF 14266D31 266FEA1E 5C41564B 777E690F 5504F213
       160217B4 B01B886A 5E91547F 9E2749F4 D7FBD7D3 B9A92EE1
       909D0D22 63F80A76 A6A24C08 7A091F53 1DBF0A01 69B6A28A
       D662A4D1 8E73AFA3 2D779D59 18D08BC8 858F4DCE F97C2A24
       855E6EEB 22B3B2E5

The generator generates a prime-order subgroup of size:

q = F518AA87 81A8DF27 8ABA4E7D 64B7CB9D 49462353

2.2.  2048-bit MODP Group with 224-bit Prime Order Subgroup

The hexadecimal value of the prime is:

p =  AD107E1E 9123A9D0 D660FAA7 9559C51F A20D64E5 683B9FD1
        B54B1597 B61D0A75 E6FA141D F95A56DB AF9A3C40 7BA1DF15
        EB3D688A 309C180E 1DE6B85A 1274A0A6 6D3F8152 AD6AC212
        9037C9ED EFDA4DF8 D91E8FEF 55B7394B 7AD5B7D0 B6C12207
        C9F98D11 ED34DBF6 C6BA0B2C 8BBC27BE 6A00E0A0 B9C49708
        B3BF8A31 70918836 81286130 BC8985DB 1602E714 415D9330
        278273C7 DE31EFDC 7310F712 1FD5A074 15987D9A DC0A486D
        CDF93ACC 44328387 315D75E1 98C641A4 80CD86A1 B9E587E8
        BE60E69C C928B2B9 C52172E4 13042E9B 23F10B0E 16E79763
        C9B53DCF 4BA80A29 E3FB73C1 6B8E75B9 7EF363E2 FFA31F71
        CF9DE538 4E71B81C 0AC4DFFE 0C10E64F

The hexadecimal value of the generator is:

   g =  AC4032EF 4F2D9AE3 9DF30B5C 8FFDAC50 6CDEBE7B 89998CAF

        74866A08 CFE4FFE3 A6824A4E 10B9A6F0 DD921F01 A70C4AFA

        AB739D77 00C29F52 C57DB17C 620A8652 BE5E9001 A8D66AD7

        C1766910 1999024A F4D02727 5AC1348B B8A762D0 521BC98A

        E2471504 22EA1ED4 09939D54 DA7460CD B5F6C6B2 50717CBE

        F180EB34 118E98D1 19529A45 D6F83456 6E3025E3 16A330EF

        BB77A86F 0C1AB15B 051AE3D4 28C8F8AC B70A8137 150B8EEB

        10E183ED D19963DD D9E263E4 770589EF 6AA21E7F 5F2FF381

        B539CCE3 409D13CD 566AFBB4 8D6C0191 81E1BCFE 94B30269

        EDFE72FE 9B6AA4BD 7B5A0F1C 71CFFF4C 19C418E1 F6EC0179

        81BC087F 2A7065B3 84B890D3 191F2BFA

   The generator generates a prime-order subgroup of size:

   q =  801C0D34 C58D93FE 99717710 1F80535A 4738CEBC BF389A99

        B36371EB

2.3.  2048-bit MODP Group with 256-bit Prime Order Subgroup

   The hexadecimal value of the prime is:

   p = 87A8E61D B4B6663C FFBBD19C 65195999 8CEEF608 660DD0F2

       5D2CEED4 435E3B00 E00DF8F1 D61957D4 FAF7DF45 61B2AA30

       16C3D911 34096FAA 3BF4296D 830E9A7C 209E0C64 97517ABD

       5A8A9D30 6BCF67ED 91F9E672 5B4758C0 22E0B1EF 4275BF7B

       6C5BFC11 D45F9088 B941F54E B1E59BB8 BC39A0BF 12307F5C

       4FDB70C5 81B23F76 B63ACAE1 CAA6B790 2D525267 35488A0E

       F13C6D9A 51BFA4AB 3AD83477 96524D8E F6A167B5 A41825D9

       67E144E5 14056425 1CCACB83 E6B486F6 B3CA3F79 71506026

       C0B857F6 89962856 DED4010A BD0BE621 C3A3960A 54E710C3

       75F26375 D7014103 A4B54330 C198AF12 6116D227 6E11715F

       693877FA D7EF09CA DB094AE9 1E1A1597

The hexadecimal value of the generator is:

   g = 3FB32C9B 73134D0B 2E775066 60EDBD48 4CA7B18F 21EF2054

       07F4793A 1A0BA125 10DBC150 77BE463F FF4FED4A AC0BB555

       BE3A6C1B 0C6B47B1 BC3773BF 7E8C6F62 901228F8 C28CBB18

       A55AE313 41000A65 0196F931 C77A57F2 DDF463E5 E9EC144B

       777DE62A AAB8A862 8AC376D2 82D6ED38 64E67982 428EBC83

       1D14348F 6F2F9193 B5045AF2 767164E1 DFC967C1 FB3F2E55

       A4BD1BFF E83B9C80 D052B985 D182EA0A DB2A3B73 13D3FE14

       C8484B1E 052588B9 B7D2BBD2 DF016199 ECD06E15 57CD0915

       B3353BBB 64E0EC37 7FD02837 0DF92B52 C7891428 CDC67EB6

       184B523D 1DB246C3 2F630784 90F00EF8 D647D148 D4795451

       5E2327CF EF98C582 664B4C0F 6CC41659

   The generator generates a prime-order subgroup of size:

   q = 8CF83642 A709A097 B4479976 40129DA2 99B1A47D 1EB3750B

       A308B0FE 64F5FBD3

2.4.  192-bit Random ECP Group

   The curve is based on the integers modulo the prime p given by:

      p = 2^(192) - 2^(64) - 1

   Group prime (in hexadecimal):

      p = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFFFF FFFFFFFF

   The equation for the elliptic curve is:

      y^2 = x^3 + ax + b (mod p)

   Group curve parameter A (in hexadecimal):

      a = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFFFF FFFFFFFC

   Group curve parameter B (in hexadecimal):

      b = 64210519 E59C80E7 0FA7E9AB 72243049 FEB8DEEC C146B9B1

   The generator for this group is given by: g=(gx,gy) where

      gx = 188DA80E B03090F6 7CBF20EB 43A18800 F4FF0AFD 82FF1012

      gy = 07192B95 FFC8DA78 631011ED 6B24CDD5 73F977A1 1E794811

   Group order (in hexadecimal):

      n = FFFFFFFF FFFFFFFF FFFFFFFF 99DEF836 146BC9B1 B4D22831

2.5.  224-bit Random ECP Group

   The curve is based on the integers modulo the prime p given by:

      p = 2^(224) - 2^(96) + 1

   Group prime (in hexadecimal):

      p = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF 00000000 00000000

          00000001

   The equation for the elliptic curve is:

      y^2 = x^3 + ax + b (mod p)

   Group curve parameter A (in hexadecimal):

      a = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFE FFFFFFFF FFFFFFFF

          FFFFFFFE

   Group curve parameter B (in hexadecimal):

      b = B4050A85 0C04B3AB F5413256 5044B0B7 D7BFD8BA 270B3943

          2355FFB4

   The generator for this group is given by: g=(gx,gy) where

      gx = B70E0CBD 6BB4BF7F 321390B9 4A03C1D3 56C21122 343280D6

           115C1D21

      gy = BD376388 B5F723FB 4C22DFE6 CD4375A0 5A074764 44D58199

           85007E34

   Group Order (in hexadecimal):

      n = FFFFFFFF FFFFFFFF FFFFFFFF FFFF16A2 E0B8F03E 13DD2945

          5C5C2A3D

2.6.  256-bit Random ECP Group

   The curve is based on the integers modulo the prime p given by:

      p = 2^(256)-2^(224)+2^(192)+2^(96)-1

   Group prime (in hexadecimal):

      p = FFFFFFFF 00000001 00000000 00000000 00000000 FFFFFFFF

          FFFFFFFF FFFFFFFF

   The equation for the elliptic curve is:

      y^2 = x^3 + ax + b (mod p)

   Group curve parameter A (in hexadecimal):

      a = FFFFFFFF 00000001 00000000 00000000 00000000 FFFFFFFF

          FFFFFFFF FFFFFFFC

Group curve parameter B (in hexadecimal):

      b = 5AC635D8 AA3A93E7 B3EBBD55 769886BC 651D06B0 CC53B0F6

          3BCE3C3E 27D2604B

   The generator for this group is given by: g=(gx,gy) where

      gx = 6B17D1F2 E12C4247 F8BCE6E5 63A440F2 77037D81 2DEB33A0

           F4A13945 D898C296

      gy = 4FE342E2 FE1A7F9B 8EE7EB4A 7C0F9E16 2BCE3357 6B315ECE

           CBB64068 37BF51F5

   Group Order (in hexadecimal):

      n = FFFFFFFF 00000000 FFFFFFFF FFFFFFFF BCE6FAAD A7179E84

          F3B9CAC2 FC632551

2.7.  384-bit Random ECP Group

   The curve is based on the integers modulo the prime p given by:

      p = 2^(384)-2^(128)-2^(96)+2^(32)-1

   Group prime (in hexadecimal):

      p = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFE FFFFFFFF 00000000 00000000 FFFFFFFF

   The equation for the elliptic curve is:

      y^2 = x^3 + ax + b (mod p)

   Group curve parameter A (in hexadecimal):

      a = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFE FFFFFFFF 00000000 00000000 FFFFFFFC

   Group curve parameter B (in hexadecimal):

      b = B3312FA7 E23EE7E4 988E056B E3F82D19 181D9C6E FE814112

          0314088F 5013875A C656398D 8A2ED19D 2A85C8ED D3EC2AEF

   The generator for this group is given by: g=(gx,gy) where

      gx = AA87CA22 BE8B0537 8EB1C71E F320AD74 6E1D3B62 8BA79B98

           59F741E0 82542A38 5502F25D BF55296C 3A545E38 72760AB7

      gy = 3617DE4A 96262C6F 5D9E98BF 9292DC29 F8F41DBD 289A147C

           E9DA3113 B5F0B8C0 0A60B1CE 1D7E819D 7A431D7C 90EA0E5F

   Group Order (in hexadecimal):

      n = FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          C7634D81 F4372DDF 581A0DB2 48B0A77A ECEC196A CCC52973

2.8.  521-bit Random ECP Group

   The curve is based on the integers modulo the prime p given by:

      p = 2^(521)-1

   Group Prime (in hexadecimal):

      p = 000001FF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

   The equation for the elliptic curve is:

      y^2 = x^3 + ax + b (mod p)

   Group curve parameter A (in hexadecimal):

      a = 000001FF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFC

   Group curve parameter B (in hexadecimal):

      b = 00000051 953EB961 8E1C9A1F 929A21A0 B68540EE A2DA725B

          99B315F3 B8B48991 8EF109E1 56193951 EC7E937B 1652C0BD

          3BB1BF07 3573DF88 3D2C34F1 EF451FD4 6B503F00

   The generator for this group is given by: g=(gx,gy) where

      gx = 000000C6 858E06B7 0404E9CD 9E3ECB66 2395B442 9C648139

           053FB521 F828AF60 6B4D3DBA A14B5E77 EFE75928 FE1DC127

           A2FFA8DE 3348B3C1 856A429B F97E7E31 C2E5BD66

      gy = 00000118 39296A78 9A3BC004 5C8A5FB4 2C7D1BD9 98F54449

           579B4468 17AFBD17 273E662C 97EE7299 5EF42640 C550B901

           3FAD0761 353C7086 A272C240 88BE9476 9FD16650

   Group Order (in hexadecimal):

      n = 000001FF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF

          FFFFFFFF FFFFFFFF FFFFFFFA 51868783 BF2F966B 7FCC0148

          F709A5D0 3BB5C9B8 899C47AE BB6FB71E 91386409

  • 15
    点赞
  • 10
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值