INCITS/ISO/IEC 19772 : 2009(R2014)
Superseded
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION
Published date
12-01-2013
Publisher
Superseded date
15-02-2020
Superseded by
Sorry this product is not available in your region.
Describes six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: - data confidentiality, i.e. protection against unauthorized disclosure of data, - data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified, - data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
| Committee |
CS1
|
| DocumentType |
Standard
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| ISO/IEC 19772:2009 | Identical |
Summarise
Sorry this product is not available in your region.