Information technology -- Security techniques -- Authenticated encryption
(Only available in English)
This standard was last reviewed* in 2014.
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
Document published on: 2009-02-15 Edition: 1 (Monolingual) ICS: 35.040 Status: Published Stage: 90.93 (2014-12-03) TC/SC: ISO/IEC JTC 1/SC 27 Number of Pages: 29
No revision information available