Skip to main content

ISO/IEC 19772:2009

Superseded Date published:

Warning: Superseded Standard. This document has been superseded without replacement. You may wish to search for a more up to date equivalent.

Information technology - Security techniques - Authenticated encryption

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

Get this standard Prices exclude GST
PDF ( Single user document)
$118.26 NZD
HardCopy
$152.17 NZD
Networkable PDF
Price varies
Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

Keep me up-to-date

Sign up to receive updates when there are changes to this standard

Related Information

Similar Standards

Preview only close
Prev {{ page }}/ {{ numPages }} Next
Preview only close
Prev {{ page }}/ {{ numPages }} Next

ISO/IEC 19772:2009

Get this standard Prices exclude GST
PDF ( Single user document)
$118.26 NZD
HardCopy
$152.17 NZD
Networkable PDF
Price varies

Request to add this standard to your subscription

ISO/IEC 19772:2009

Price varies
Online library subscription

Your organisation’s Account Administrator must approve a request to add a standard to your subscription.

You may add a comment to the administrator below.

Cancel