Home

ISO/IEC 19772:2009
Subscribe to updates

Information technology -- Security techniques -- Authenticated encryption

Abstract

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

 

Format
  • PDF

    This format preserves the paper layout, and is watermarked

  • EPUB

    This format allows documents to be read on tablets and smartphones

  • COLOUR PDF

    Enhanced user-friendly colour PDF format

  • REDLINE

    See any updates made from previous versions at a glance

  • PAPER

    Normally A4 size documents. Shipping costs apply

Language
PDF
Paper

Swiss francs CHF 138

Add to basket

Contact customer services

Send your enquiry by email
or call us on +41 22 749 08 88
09:00 – 12:30, 14:00 – 17:00 (UTC+1).