Customer Service:
Mon - Fri: 8:30 am - 6 pm EST

 Historical

ISO/IEC 19772:2009

Information technology - Security techniques - Authenticated encryption

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.


Content Provider
International Organization for Standardization [iso]


Others Also Bought

Identification cards -- Integrated circuit(s) cards with contacts -- Part 10: Electronic signals and answer to ...
Information technology - Security techniques - Modes of operation for an n-bit block cipher
Document History
Revised By:
Included in Packages
This standard is not included in any packages.
Amendments & Corrections
ANSI Logo

As the voice of the U.S. standards and conformity assessment system, the American National Standards Institute (ANSI) empowers its members and constituents to strengthen the U.S. marketplace position in the global economy while helping to assure the safety and health of consumers and the protection of the environment.

CUSTOMER SERVICE
NEW YORK OFFICE
ANSI HEADQUARTERS