Reference number
ISO/IEC 19772:2009
ISO/IEC 19772:2009
Information technology — Security techniques — Authenticated encryption
Edition 1
2009-02
Withdrawn
ISO/IEC 19772:2009
46345
Withdrawn (Edition 1, 2009)

Abstract

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

General information

  •  : Withdrawn
     : 2009-02
    : Withdrawal of International Standard [95.99]
  •  : 1
     : 29
  • ISO/IEC JTC 1/SC 27
    35.030 
  • RSS updates

Life cycle

Got a question?

Check out our Help and Support