Abstract
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
General information
-
Status: WithdrawnPublication date: 2009-02Stage: Withdrawal of International Standard [95.99]
-
Edition: 1Number of pages: 29
-
Technical Committee :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS updates
Life cycle
-
Now
-
00
Preliminary
-
10
Proposal
-
20
Preparatory
-
30
Committee
-
40
Enquiry
-
50
Approval
-
60
Publication
-
90
Review
-
95
Withdrawal
Corrigenda
Correct the current edition; free; not included in the text of the existing standard.WithdrawnISO/IEC 19772:2009/Cor 1:2014
-
00
-
Revised by
PublishedISO/IEC 19772:2020