logo

Standards Manage Your Business

We Manage Your Standards

IEC

ISO/IEC 19772:2009

Information technology -- Security techniques -- Authenticated encryption

Standard Details

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

General Information

Status : WITHDRAWN
Standard Type: Main
Document No: ISO/IEC 19772:2009
Document Year: 2009
Pages: 29
Edition: 1.0
  • ICS:
  • 35.030 IT Security *Including encryption

Life Cycle

Currently Viewing

WITHDRAWN
ISO/IEC 19772:2009
Knowledge Corner

Expand Your Knowledge and Unlock Your Learning Potential - Your One-Stop Source for Information!

© Copyright 2024 BSB Edge Private Limited.

Enquire now +