ISO/IEC 19772:2009
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Authenticated encryption
Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users
03-12-2020
12-02-2009
ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.
DocumentType |
Standard
|
Pages |
29
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy |
Standards | Relationship |
BS ISO/IEC 19772:2009 | Identical |
INCITS/ISO/IEC 19772 : 2009(R2014) | Identical |
15/30288056 DC : 0 | BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
18/30361485 DC : 0 | BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS |
16/30304626 DC : 0 | BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 9798-2:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
14/30250091 DC : 0 | BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 11770-1 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
CSA ISO/IEC 9798-2 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ISO/IEC/IEEE 8802-15-6:2017 | Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
17/30352205 DC : 0 | BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO 20215:2015 | Space data and information transfer systems — CCSDS cryptographic algorithms |
INCITS/ISO/IEC 9798-2 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
CSA ISO/IEC 11770-2 : 2009 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
ISO 20038:2017 | Banking and related financial services — Key wrap using AES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
OVE/ONORM EN 62734 : 2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A (IEC 62734:2014) |
BS ISO/IEC 9798-2:2008 | Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms |
BS ISO/IEC 24745:2011 | Information technology. Security techniques. Biometric information protection |
BS ISO/IEC 20009-4:2017 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets |
BS ISO 20215:2015 | Space data and information transfer systems. CCSDS cryptographic algorithms |
09/30204756 DC : 0 | BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
07/30167508 DC : 0 | BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11770-1:12 (R2016) | Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01) |
14/30312433 DC : 0 | BS ISO 20215 - SPACE DATA AND INFORMATION TRANSFER SYSTEMS - CCSDS CRYPTOGRAPHIC ALGORITHMS |
INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
BS ISO/IEC 11770-3 : 2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ECMA 409 : 2ED 2015 | NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM |
IEC TR 61850-90-5:2012 | Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
BS ISO/IEC 10116:2017 | Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 11770-1:2010 | Information technology Security techniques Key management Part 1: Framework |
ISO/IEC TR 24741:2018 | Information technology — Biometrics — Overview and application |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
BS ISO/IEC 11770-1:2010 | Information technology. Security techniques. Key management Framework |
10/30136309 DC : 0 | BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
15/30279582 DC : 0 | BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
18/30362144 DC : 0 | BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
BS ISO 20038:2017 | Banking and related financial services. Key wrap using AES |
07/30173155 DC : 0 | BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS |
PD IEC/TR 61850-90-5:2012 | Communication networks and systems for power utility automation Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118 |
BS ISO/IEC 11770-2:2008 | Information technology. Security techniques. Key management Mechanisms using symmetric techniques |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
IEC PAS 62734:2012 | Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications |
PD IEC/PAS 62734:2012 | Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications |
INCITS/ISO/IEC 18033-1 : 2005 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
INCITS/ISO/IEC 24745 : 2012(R2017) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION |
BS ISO/IEC 18033-1:2015 | Information technology. Security techniques. Encryption algorithms General |
ECMA 411 : 3ED 2017 | NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY |
CSA ISO/IEC 18033-1 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL |
ISO/IEC 13157-5:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
ISO/IEC 13157-3:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
ISO/IEC 18033-1:2015 | Information technology Security techniques Encryption algorithms Part 1: General |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10116:2017 | Information technology — Security techniques — Modes of operation for an n-bit block cipher |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.