관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives: — data confidentiality, i.e. protection against unauthorized disclosure of data; — data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified; — data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator. All five methods specified in this document are based on a block cipher algorithm, and require the originator and the recipient of the protected data to share a secret key for this block cipher. Key management is outside the scope of this document. Key management techniques are defined in ISO/IEC 11770 (all parts). Four of the mechanisms in this document, namely mechanisms 3, 4, 5 (AAD variant only) and 6, allow data to be authenticated which is not encrypted. That is, these mechanisms allow a data string that is to be protected to be divided into two parts, D, the data string that is to be encrypted and integrity-protected, and A (the additional authenticated data) that is integrity-protected but not encrypted. In all cases, the string A can be empty. NOTE Examples of types of data that can need to be sent in unencrypted form, but whose integrity is to be protected, include addresses, port numbers, sequence numbers, protocol version numbers and other network protocol fields that indicate how the plaintext is to be handled, forwarded or processed. |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 26 |
Edition | 2 |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 19772:21 | Information security — Authenticated encryption (Adopted ISO/IEC 19772:2020, second edition, 2020-11) | 2021-01-01 | 표준 |
2 | ISO/IEC 19772:2020 | Information security - Authenticated encryption | 2020-11-27 | 표준 |
3 | ISO/IEC 19772:2020 | Information security — Authenticated encryption | 2020-11-27 | 표준 |
4 | ISO/IEC 19772:2009/Cor 1:2014 | 2014-09-01 | 구판 | |
5 | ISO/IEC 19772:2009/COR1:2014 | Information technology - Security techniques - Authenticated encryption - Technical Corrigendum 1 | 2014-09-01 | 구판 |
6 | ISO/IEC 19772:2009 | Information technology - Security techniques - Authenticated encryption | 2009-02-12 | 구판 |
7 | ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption | 2009-02-12 | 구판 |
관련상품이 존재하지 않습니다.
KS X ISO/IEC 10118-3 - 정보기술 — 보안기술 — 해시 함수 — 제3부: 전용 해시 함수 상세보기
KS X 3262 - 해시 함수 LSH 상세보기
KS X ISO/IEC 18033-2(2017 확인) - 정보 기술-보안 기술-암호 알고리즘-제2부:비대칭형 암호 상세보기
ISO/IEC 17025:2017 - General requirements for the competence of testing and calibration laboratories 상세보기
ISO/IEC TS 29003:2018 - Information technology — Security techniques — Identity proofing 상세보기
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기