ISO/IEC 19772:2020 PDF

ISO/IEC 19772:2020 PDF

Name:
ISO/IEC 19772:2020 PDF

Published Date:
12/01/2020

Status:
Active

Description:

Information security - Authenticated encryption

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$49.8
Need Help?

ISO/IEC 19772:2020 specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:

— data confidentiality, i.e. protection against unauthorized disclosure of data;

— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;

— data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.

All five methods specified in this document are based on a block cipher algorithm, and require the originator and the recipient of the protected data to share a secret key for this block cipher.

Key management is outside the scope of this document. Key management techniques are defined in ISO/IEC 11770 (all parts).

Four of the mechanisms in this document, namely mechanisms 3, 4, 5 (AAD variant only) and 6, allow data to be authenticated which is not encrypted. That is, these mechanisms allow a data string that is to be protected to be divided into two parts, D, the data string that is to be encrypted and integrity-protected, and A (the additional authenticated data) that is integrity-protected but not encrypted. In all cases, the string A can be empty.

NOTE Examples of types of data that can need to be sent in unencrypted form, but whose integrity is to be protected, include addresses, port numbers, sequence numbers, protocol version numbers and other network protocol fields that indicate how the plaintext is to be handled, forwarded or processed.


Edition : 2nd
File Size : 1 file , 1.2 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Number of Pages : 34
Published : 12/01/2020
Same As : ISO/IEC 19772:2020

History

ISO/IEC 19772:2020
Published Date: 12/01/2020
Information security - Authenticated encryption
$49.8
ISO/IEC 19772:2009
Published Date: 02/15/2009
Information technology - Security techniques - Authenticated encryption
$48.6

Related products

ISO/IEC 18031:2011
Published Date: 01/01/2011
Information technology - Security techniques - Random bit generation
$83.4
ISO/IEC 15946-5:2022
Published Date: 03/01/2022
Information security - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
$58.2
ISO/IEC 9798-1:2010
Published Date: 07/01/2010
Information technology - Security techniques - Entity authentication - Part 1: General
$24.3

Best-Selling Products

UTS AppPack TK5.0 IRF
Published Date:
AppPack TK Solver 5.0 Standard (Standalone) and Interactive Roark's Formulas
UTS INTERACTIVE ROARK
Published Date:
Interactive Roark's Formulas (Standalone)
UTS MATHLOOK
Published Date:
MathLook for Excel (TM)
UTS ROARK FOR EXCEL
Published Date:
Roark’s Formulas for Excel (TM): Control your stress
UTS TK5.0
Published Date:
TK Solver 5.0 Standard (Standalone)