Publication CODE |
Title |
ISO/IEC 19772:2009 (2009-02) |
INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- AUTHENTICATED ENCRYPTION |
|
Price Excl. VAT |
Total number of pages, tables and drawings |
160.00 €
|
29. |
Description
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
|
Class |
C990
(IEC PUBLICATIONS IEC PUBLICATIONS)
|
Status |
IEC PUBLICATION |
Situation |
Currently active
|
|
Committee |
ISO/IEC JTC 1/SC 27
IT SECURITY TECHNIQUES
|
BEC Approval |
2009-02-12 |
ICS-Code (International Standards Classification) |
35.030
|
NBN Status |
New |
|
IEC publication date |
2009-02-12 |
IEC last modification date |
2014-04-14 |
|