BS ISO/IEC 19772:2020
Information security. Authenticated encryption
Standard number: | BS ISO/IEC 19772:2020 |
Pages: | 34 |
Released: | 2020-12-07 |
ISBN: | 978 0 539 15001 8 |
Status: | Standard |
BS ISO/IEC 19772:2020 Information Security - Authenticated Encryption
In the rapidly evolving digital landscape, ensuring the security of information is paramount. The BS ISO/IEC 19772:2020 standard is a crucial tool for organizations and individuals who prioritize the protection of their data. Released on December 7, 2020, this standard provides comprehensive guidelines on authenticated encryption, a method that not only encrypts data but also verifies its authenticity.
Why Choose BS ISO/IEC 19772:2020?
With the increasing sophistication of cyber threats, traditional encryption methods are no longer sufficient. Authenticated encryption, as outlined in this standard, offers a dual layer of security by ensuring that the data has not been tampered with during transmission. This is particularly important for sensitive information that requires both confidentiality and integrity.
Key Features of the Standard
- Standard Number: BS ISO/IEC 19772:2020
- Pages: 34
- Release Date: December 7, 2020
- ISBN: 978 0 539 15001 8
- Status: Standard
Comprehensive Coverage
This 34-page document delves into the intricacies of authenticated encryption, providing detailed explanations and methodologies that are essential for implementing robust security measures. Whether you are a cybersecurity professional, a software developer, or an IT manager, this standard is an invaluable resource that will enhance your understanding and application of authenticated encryption techniques.
Benefits of Implementing Authenticated Encryption
By adhering to the guidelines set forth in BS ISO/IEC 19772:2020, organizations can achieve several benefits:
- Enhanced Security: Protects data from unauthorized access and ensures its integrity.
- Compliance: Aligns with international standards, facilitating global operations and partnerships.
- Trust: Builds confidence among clients and stakeholders by demonstrating a commitment to data security.
Who Should Use This Standard?
The BS ISO/IEC 19772:2020 standard is designed for a wide range of users, including:
- IT Security Professionals: To implement and manage secure systems.
- Software Developers: To integrate authenticated encryption into applications.
- Compliance Officers: To ensure adherence to international security standards.
- Business Leaders: To make informed decisions about data protection strategies.
Stay Ahead of Cyber Threats
In a world where cyber threats are constantly evolving, staying ahead is crucial. The BS ISO/IEC 19772:2020 standard equips you with the knowledge and tools needed to protect your data effectively. By implementing authenticated encryption, you not only safeguard your information but also enhance your organization's reputation as a leader in cybersecurity.
Conclusion
Investing in the BS ISO/IEC 19772:2020 standard is a strategic move for any organization that values data security. With its comprehensive guidelines and focus on authenticated encryption, this standard is an essential resource for anyone looking to bolster their cybersecurity measures. Don't leave your data vulnerable—embrace the power of authenticated encryption today.
BS ISO/IEC 19772:2020
This standard BS ISO/IEC 19772:2020 Information security. Authenticated encryption is classified in these ICS categories:
- 35.030 IT Security
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
-
data confidentiality, i.e. protection against unauthorized disclosure of data;
-
data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
-
data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.
All five methods specified in this document are based on a block cipher algorithm, and require the originator and the recipient of the protected data to share a secret key for this block cipher.
Key management is outside the scope of this document. Key management techniques are defined in ISO/IEC 11770 (all parts).
Four of the mechanisms in this document, namely mechanisms 3, 4, 5 (AAD variant only) and 6, allow data to be authenticated which is not encrypted. That is, these mechanisms allow a data string that is to be protected to be divided into two parts, D, the data string that is to be encrypted and integrity-protected, and A (the additional authenticated data) that is integrity-protected but not encrypted. In all cases, the string A can be empty.
Examples of types of data that can need to be sent in unencrypted form, but whose integrity is to be protected, include addresses, port numbers, sequence numbers, protocol version numbers and other network protocol fields that indicate how the plaintext is to be handled, forwarded or processed.