ISO/IEC 19772:2009 Preview

Information technology -- Security techniques -- Authenticated encryption

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.


General information

  • Current status : Published
    Publication date : 2009-02
  • Edition : 1
    Number of pages : 29
  • :
    ISO/IEC JTC 1/SC 27
    IT Security techniques
  • 35.030
    IT Security

Buy this standard

Format Language
PDF
Paper
  • CHF138

Got a question?

Check out our FAQs


Customer care
+41 22 749 08 88

Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)

Life cycle

A standard is reviewed every 5 years



Revisions / Corrigenda

You may be interested in:

Keep up to date with ISO

Sign up to our newsletter for the latest news, views and product information