Standard

ISO/IEC 19772:2009

[Superseded]

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
Published: 15/02/2009
Pages: 29
Content history
Content history

One-time Purchase

Access via web browser on any device
One-time purchase
Single publication
Offline access via PDF^

$122.50 AUD

Inclusive of GST
Format *
iconCreated with Sketch.
Web Reader (PDF)
Licenses *
iconCreated with Sketch.
1 License (for yourself - not shareable)
Total$122.50 AUD
Add to Cart
IMPORTANT