
ISO 29192:2022
ISO 29192:2022 Information security – Lightweight cryptography – Part 8: Authenticated encryption
CDN $173.00
Description
This document specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms.
This method processes a data string with the following security objectives:
a) data confidentiality, i.e. protection against unauthorized disclosure of data,
b) data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified.
Optionally, this method can provide data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
The method specified in this document is based on a lightweight stream cipher, and requires the parties of the protected data to share a secret key for this algorithm. Key management is outside the scope of this document.
NOTE     Key management techniques are defined in the ISO/IEC 11770 series.
Edition
1
Published Date
2022-09-14
Status
PUBLISHED
Pages
17
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment
Abstract
This document specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms.
This method processes a data string with the following security objectives:
a) data confidentiality, i.e. protection against unauthorized disclosure of data,
b) data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified.
Optionally, this method can provide data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
The method specified in this document is based on a lightweight stream cipher, and requires the parties of the protected data to share a secret key for this algorithm. Key management is outside the scope of this document.
NOTE     Key management techniques are defined in the ISO/IEC 11770 series.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-

ISO 2382:2015 Information technology – Vocabulary
CDN $0.00 Add to cart -

ISO 22553:2019 Paints and varnishes – Electro-deposition coatings – Part 1: Vocabulary
CDN $76.00 Add to cart -

ISO 80000:2025 Quantities and units – Part 13: Information science and technology
CDN $203.00 Add to cart -

ISO 5078:2025 Management of terminology resources – Terminology extraction
CDN $233.00 Add to cart







