ISO/IEC 19772:2009

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Information Technology - Security Techniques - Authenticated Encryption.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • ISO
  • IT Security
  • Security
  • Technology

Course programme

Description
Information Technology - Security Techniques - Authenticated Encryption.

Program

Order ISO/IEC 19772:2009 today!ISO/IEC 19772:2009 specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
  • Data confidentiality i.e. protection against unauthorised disclosure of data,
  • Data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified,
  • Data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
All six methods specified in ISO/IEC 19772:2009 require the originator and the recipient of the protected data to share a secret key. Key management is outside the scope of ISO/IEC 19772:2009, key management techniques are defined in ISO/IEC 11770.
Key Features and Benefits:
  • Specifies six methods for authenticated encryption that will help you to keep your organisation's data confidential.
Pages: 29
Format: Hardcopy
Published Date: 12 February 2009
Availability: In Stock

Order this data encryption standard today!

ISO/IEC 19772:2009

Price on request