1.212.642.4980     info@ansi.org    8:30am – 6pm EST, Monday – Friday
ANSI Standards Store

Browse ISO Standards
Browse IEC Standards

View all Publishers





View All Standards Packages



Search tips Search tips

ISO/IEC 19772:2009

     

Information technology - Security techniques - Authenticated encryption

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.


Need more than one copy or have multiple people needing access,
an ANSI Site License Subscription may be the perfect solution.

Would you like to Email to a friend? If you would like to Email a friend a link to this item please    Login

Questions?