• There are no items in your cart

ISO/IEC 19772:2009

Withdrawn
Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by
withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Information technology Security techniques Authenticated encryption
Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Withdrawn date

12-03-2020

Published date

02-12-2009

ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: data confidentiality, i.e. protection against unauthorized disclosure of data; data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009; key management techniques are defined in ISO/IEC 11770.

DocumentType
Standard
Pages
29
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy

Standards Relationship
BS ISO/IEC 19772:2009 Identical
SANS 19772 : 1ED 2009 Identical
INCITS/ISO/IEC 19772 : 2009(R2014) Identical

15/30288056 DC : 0 BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER
BS ISO/IEC 11770-5:2011 Information technology Security techniques. Key management Group key management
18/30361485 DC : 0 BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS
16/30304626 DC : 0 BS ISO 20038 - BANKING AND RELATED FINANCIAL SERVICES - KEY WRAP
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CSA ISO/IEC 9798-2:2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
14/30250091 DC : 0 BS ISO/IEC 18033-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CSA ISO/IEC 11770-1 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
CSA ISO/IEC 9798-2 : 2010 : R2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 11770-2 : 2009 : INC : COR 1 : 2010 : R2014 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO/IEC/IEEE 8802-15-6:2017 Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 15-6: Wireless body area network
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
ISO/IEC 11770-5:2011 Information technology Security techniques Key management Part 5: Group key management
10/30192164 DC : DRAFT JUNE 2010 BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION
17/30352205 DC : 0 BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
12/30259506 DC : DRAFT JAN 2012 BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A)
ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
ISO 20215:2015 Space data and information transfer systems — CCSDS cryptographic algorithms
INCITS/ISO/IEC 9798-2 : 2010 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 9798-2 : 2010 : INC : COR 2 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
CSA ISO/IEC 11770-2 : 2009 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
ISO 20038:2017 Banking and related financial services — Key wrap using AES
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
OVE/ONORM EN 62734 : 2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A (IEC 62734:2014)
BS ISO/IEC 9798-2:2008 Information technology. Security techniques. Entity authentication Mechanisms using symmetric encipherment algorithms
BS ISO/IEC 24745:2011 Information technology. Security techniques. Biometric information protection
BS ISO/IEC 20009-4:2017 Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets
BS ISO 20215:2015 Space data and information transfer systems. CCSDS cryptographic algorithms
09/30204756 DC : 0 BS ISO/IEC 11770-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 1: FRAMEWORK
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
07/30167508 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2 - MECHANISMS USING SYMMETRIC TECHNIQUES
CAN/CSA-ISO/IEC 11770-1:12 (R2016) Information technology - Security techniques - Key management - Part 1: Framework (Adopted ISO/IEC 11770-1:2010, second edition, 2010-12-01)
14/30312433 DC : 0 BS ISO 20215 - SPACE DATA AND INFORMATION TRANSFER SYSTEMS - CCSDS CRYPTOGRAPHIC ALGORITHMS
INCITS/ISO/IEC 11770-5 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT
BS ISO/IEC 11770-3 : 2015 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
ECMA 409 : 2ED 2015 NFC-SEC-02: NFC-SEC CRYPTOGRAPHY STANDARD USING ECDH-256 AND AES-GCM
IEC TR 61850-90-5:2012 Communication networks and systems for power utility automation - Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
BS ISO/IEC 10116:2017 Information technology. Security techniques. Modes of operation for an <i>n</i>-bit block cipher
ISO/IEC 11770-2:2008 Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques
ISO/IEC 11770-1:2010 Information technology Security techniques Key management Part 1: Framework
ISO/IEC TR 24741:2018 Information technology Biometrics Overview and application
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
NASA CCSDS 352.0-B : ISSUE 1 CCSDS CRYPTOGRAPHIC ALGORITHMS
BS ISO/IEC 11770-1:2010 Information technology. Security techniques. Key management Framework
10/30136309 DC : 0 BS ISO/IEC 24745 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
15/30279582 DC : 0 BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING
18/30362144 DC : 0 BS ISO/IEC 11770-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
BS ISO 20038:2017 Banking and related financial services. Key wrap using AES
07/30173155 DC : 0 BS ISO/IEC 9798-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 2: MECHANISMS USING SYMMETRIC ENCIPHERMENT ALGORITHMS
PD IEC/TR 61850-90-5:2012 Communication networks and systems for power utility automation Use of IEC 61850 to transmit synchrophasor information according to IEEE C37.118
BS ISO/IEC 11770-2:2008 Information technology. Security techniques. Key management Mechanisms using symmetric techniques
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher
ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
IEC PAS 62734:2012 Industrial communication networks - Fieldbus specifications - Wireless systems for industrial automation: process control and related applications
PD IEC/PAS 62734:2012 Industrial communication networks. Fieldbus specifications. Wireless systems for industrial automation: process control and related applications
INCITS/ISO/IEC 18033-1 : 2005 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
INCITS/ISO/IEC 24745 : 2012(R2017) INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BIOMETRIC INFORMATION PROTECTION
BS ISO/IEC 18033-1:2015 Information technology. Security techniques. Encryption algorithms General
ECMA 411 : 3ED 2017 NFC-SEC-04: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING SYMMETRIC CRYPTOGRAPHY
CSA ISO/IEC 18033-1 : 2006 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
CSA ISO/IEC 18033-1 : 2006 : INC : AMD 1 : 2012 : R2016 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 1: GENERAL
ISO/IEC 13157-5:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 5: NFC-SEC entity authentication and key agreement using symmetric cryptography
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
ISO/IEC 20009-4:2017 Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets
ISO/IEC 13157-3:2016 Information technology Telecommunications and information exchange between systems NFC Security Part 3: NFC-SEC cryptography standard using ECDH-256 and AES-GCM
ISO/IEC 24745:2011 Information technology Security techniques Biometric information protection

ISO/IEC 18033-1:2015 Information technology Security techniques Encryption algorithms Part 1: General
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10116:2017 Information technology — Security techniques — Modes of operation for an n-bit block cipher

View more information
US$73.00
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.