Resumen
This document specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms.
This method processes a data string with the following security objectives:
a) data confidentiality, i.e. protection against unauthorized disclosure of data,
b) data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified.
Optionally, this method can provide data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
The method specified in this document is based on a lightweight stream cipher, and requires the parties of the protected data to share a secret key for this algorithm. Key management is outside the scope of this document.
NOTE Key management techniques are defined in the ISO/IEC 11770 series.
Informaciones generales
-
Estado: PublicadoFecha de publicación: 2022-09Etapa: Norma Internacional publicada [60.60]
-
Edición: 1Número de páginas: 17
-
Comité Técnico :ISO/IEC JTC 1/SC 27ICS :35.030
- RSS actualizaciones
Ciclo de vida
-
Ahora
-
00
Preliminar
-
10
Propuesta
-
20
Preparación
-
30
Comité
-
40
Consulta
-
50
Aprobación
-
60
Publicación
-
90
Revisión
-
95
Retirada
Modificaciones
Aportan contenido adicional; disponible para su compra; no incluidas en el texto de la norma existente.En desarrolloISO/IEC 29192-8:2022/WD Amd 1
-
00