Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $186.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

 

Document History

  1. ISO/IEC 19772:2009/Cor1:2014


    Corrigendum

    • Most Recent
  2. ISO/IEC 19772:2009

    👀 currently
    viewing


    Information technology - Security techniques - Authenticated encryption

    • Historical Version
 

Amendments, rulings, supplements, and errata

  1. ISO/IEC 19772:2009/Cor1:2014

    Free
    Download


    Corrigendum