BS ISO/IEC 19772:2009 - Information technology. Security techniques. Authenticated encryption
Our payment provider will performing maintenance on 4th March 2021 between 4AM and 6AM UK time. During this period, you may experience slight interruptions when placing card orders. Please accept our apologies for any inconvenience caused during this essential maintenance.

BS ISO/IEC 19772:2009

Information technology. Security techniques. Authenticated encryption

Status : Superseded, Withdrawn   Published : July 2009 Replaced By : BS ISO/IEC 19772:2020

WITHDRAWN TITLE
*To ask about withdrawn titles contact the
Customer Relations
cservices@bsigroup.com, +44 345 086 9001


This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:

  • data confidentiality, i.e. protection against unauthorized disclosure of data,

  • data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified,

  • data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.

All six methods specified in this International Standard are based on a block cipher algorithm, and require the originator and the recipient of the protected data to share a secret key for this block cipher. Key management is outside the scope of this standard; key management techniques are defined in ISO/IEC 11770.

Four of the mechanisms in this standard, namely mechanisms 1, 3, 4 and 6, allow data to be authenticated which is not encrypted. That is, these mechanisms allow a data string that is to be protected to be divided into two parts, D, the data string that is to be encrypted and integrity-protected, and A (the additional authenticated data) that is integrity-protected but not encrypted. In all cases, the string A may be empty.

NOTE

Examples of types of data that may need to be sent in unencrypted form, but whose integrity should be protected, include addresses, port numbers, sequence numbers, protocol version numbers, and other network protocol fields that indicate how the plaintext should be handled, forwarded, or processed.




Standard NumberBS ISO/IEC 19772:2009
TitleInformation technology. Security techniques. Authenticated encryption
StatusSuperseded, Withdrawn
Publication Date31 July 2009
Withdrawn Date07 December 2020
Normative References(Required to achieve compliance to this standard)ISO/IEC 10116:2017, ISO/IEC 9797-1, ISO/IEC 18033-3
Informative References(Provided for Information)ISO/IEC 11770, ISO/IEC 10118, ISO/IEC 9797, ISO/IEC 18033-1:2005
Replaced ByBS ISO/IEC 19772:2020
International RelationshipsISO/IEC 19772:2009/Cor 1:2014
Amended ByCorrigendum, September 2014
DescriptorsCoded representation, Data integrity, Information exchange, Identification methods, Cryptography, Verification, Algorithms, Data processing, Data conversion, Data security, Codes
ICS35.030
Title in FrenchTechnologies de l'information. Techniques de sécurité. Chiffrage authentifié
CommitteeIST/33/2
ISBN978 0 580 86465 0
PublisherBSI
FormatA4
DeliveryYes
Pages40
File Size1.178 MB
Price£218.00


WITHDRAWN TITLE
*To ask about withdrawn titles contact the
Customer Relations
cservices@bsigroup.com, +44 345 086 9001
 Your basket
Your basket is empty

Multi-user access to over 3,500 medical device standards, regulations, expert commentaries and other documents


BSOL

Access, view and download standards with multiple user access, across multiple sites with BSOL


Worldwide Standards
We can source any standard from anywhere in the world


Develop a PAS

Develop a fast-track standardization document in 9-12 months