This standard has been revised byISO/IEC 19772:2020
Abstract
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
General information
-
Status : WithdrawnPublication date : 2009-02
-
Edition : 1Number of pages : 29
-
Technical Committee:Information security, cybersecurity and privacy protection
-
- ICS :
-
IT Security
Life cycle
-
Now
Corrigenda / Amendments
WithdrawnISO/IEC 19772:2009/Cor 1:2014
-
Revised by
PublishedISO/IEC 19772:2020
Got a question?
Check out our FAQs
Opening hours:
Monday to Friday - 09:00-12:00, 14:00-17:00 (UTC+1)
Keep up to date with ISO
Sign up to our newsletter for the latest news, views and product information.