ISO/IEC-19772 Information security - Authenticated encryption

ISO/IEC-19772 - 2ND EDITION - CURRENT
Show Complete Document History

Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:


This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:

— data confidentiality, i.e. protection against unauthorized disclosure of data;

— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;

— data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.

All five methods specified in this document are based on a block cipher algorithm, and require the originator and the recipient of the protected data to share a secret key for this block cipher.

Key management is outside the scope of this document. Key management techniques are defined in ISO/IEC 11770 (all parts).

Four of the mechanisms in this document, namely mechanisms 3, 4, 5 (AAD variant only) and 6, allow data to be authenticated which is not encrypted. That is, these mechanisms allow a data string that is to be protected to be divided into two parts, D, the data string that is to be encrypted and integrity-protected, and A (the additional authenticated data) that is integrity-protected but not encrypted. In all cases, the string A can be empty.

NOTE Examples of types of data that can need to be sent in unencrypted form, but whose integrity is to be protected, include addresses, port numbers, sequence numbers, protocol version numbers and other network protocol fields that indicate how the plaintext is to be handled, forwarded or processed.

ORDER

Price:

$161.02        


Want this as a site license?

To find similar documents by classification:

35.030 (IT Security Including encryption)

35.040 (Character sets and information coding Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.)

This document comes with our free Notification Service, good for the life of the document.

This document is available in either Paper or PDF format.

 

Customers who bought this document also bought:

ISO-15223-1
Medical devices - Symbols to be used with information to be supplied by the manufacturer - Part 1: General requirements

IEC-61000-4-11
Electromagnetic compatibility (EMC) - Part 4-11: Testing and measurement techniques - Voltage dips, short interruptions and voltage variations immunity tests for equipment with input current up to 16 A per phase

IEC-60601-1-2
Medical electrical equipment - Part 1-2: General requirements for basic safety and essential performance - Collateral Standard: Electromagnetic disturbances - Requirements and tests

Document Number

ISO/IEC 19772:2020

Revision Level

2ND EDITION

Status

Current

Publication Date

Nov. 1, 2020

Committee Number

ISO/IEC JTC 1/SC 27