Also add a German made Elliptic Curve with a 1033 bit prime called "anders_1032_1" made by Prof. Dr. Michael Anders to all your line of products. Is the only elliptic curve the author makes openly available for commercial use at no cost. The author himself thinks there is consensus that 256 bit elliptic curves should be enough for decades. My personal opinion is that in the past NSA has made DES to be a secure algorithm but small enough to crack it... probably they are doing the same with P-256, P-384 and P-512 even if they don't contain some vulnerability themselves (safecurves web site and others seems to think otherwise) they can just be too small and the several sizes are just to make people think they have options... while all can be to small to start with... not for normal computer world but for those with billions of dollars and own laboratories to make things happen. At least in dedicated security hardware like Nitrokey should be safe to use these "anders_1032_1" elliptic curve. For what? Currently there is no software for it, but make it available and I'm sure people will start modifying GnuPG, E-mail programs and maybe others to benefit from the much higher security level of the elliptic curve... that if the current comparisons are to be hold truth should give equivalent symmetric security up to ~516 bit. Heck, those "military grade" (no such grade in most countries... but who cares?) software company's will love to have support for that for sure... "be even more secure than your bank", "your bank may use 384 bit elliptic curve but we offer support for a 1033 bit one" or even better "have the most secure bank in the country with our {insert here your random company name} encryption/ digital signature/ authentication solution, and use Nitrokey to keep the key secure on hardware". You get the idea... even if it is not really needed it will be nice to have a bigger option already available... specially if someone finds out in the near future that 256 bit elliptic curves are not so secure as they would hope. Parameters: ID: anders_1032_1 MODUL: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc73 coeff_A: fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc70 coeff_B: d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d0015b3 q_MODUL: 0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000184ce99c462d57387687f83e43f191166f0a07b527136b230558cabe982fc856bf6239a1c95e44421a71c553d223e1e8b6941687648973a94d4027ca61abe02331 X0: 0d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d001500acc1de24000000d02a1d001500bad000000d02a1d001500f0e000000d02a1d0015d Y0: 57029d58aeccbf320f5c337d84b7b30d8a412149ed8c526a4d9c0faa829f4ebfbb966bd235bf7dbcb21679b463ecdf73eb80031fb1855e96d37b67731863374e4295dcf904eac0f4cf22604bbfb66c6e4b1e72de7ad6a7289b6c921f8bebf2fcef346ba5f9ce1d6ce660510e345118d42168edb704be01b3ac41f7e485cfdd3df9 END
Fill in the blank.