Résumé
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
Informations générales
-
État actuel: AnnuléeDate de publication: 2009-02Stade: Annulation de la Norme internationale [95.99]
-
Edition: 1
-
Comité technique :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS mises à jour
Cycle de vie
-
Actuellement
-
00
Préliminaire
-
10
Proposition
-
20
Préparation
-
30
Comité
-
40
Enquête
-
50
Approbation
-
60
Publication
-
90
Examen
-
95
Annulation
Rectificatifs techniques
Corrigent l’édition en vigueur; gratuits; non inclus dans le texte de la norme en vigueur.AnnuléeISO/IEC 19772:2009/Cor 1:2014
-
00
-
Révisée par
PubliéeISO/IEC 19772:2020