ISO/IEC 19772:2009

Information technology — Security techniques — Authenticated encryption

Publication date:   Feb 12, 2009

95.99 Withdrawal of Standard   Nov 27, 2020

General information

95.99 Withdrawal of Standard   Nov 27, 2020

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

  Withdrawn

PDF - €76.23

  English  



Buy

Scope

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

Life cycle

NOW

WITHDRAWN
ISO/IEC 19772:2009
95.99 Withdrawal of Standard
Nov 27, 2020

CORRIGENDA / AMENDMENTS

WITHDRAWN
ISO/IEC 19772:2009/Cor 1:2014

ABANDON
ISO/IEC 19772:2009/DAmd 1

REVISED BY

PUBLISHED
ISO/IEC 19772:2020