INCITS/ISO/IEC 19772:2009[R2019]
Current
The latest, up-to-date edition.
Information technology - Security techniques - Authenticated encryption
Hardcopy , PDF
English
28-01-2020
This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data, - data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified, - data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
Committee |
ISO/IEC JTC 1
|
DocumentType |
Standard
|
Pages |
0
|
PublisherName |
Information Technology Industry Council
|
Status |
Current
|
Supersedes |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.