ISO IEC 19772-2020 PDF
Name in English:
St ISO IEC 19772-2020
Name in Russian:
Ст ISO IEC 19772-2020
Original standard ISO IEC 19772-2020 in PDF full version. Additional info + preview on request
Full title and description
ISO/IEC 19772:2020 — Information security — Authenticated encryption. International standard that specifies defined methods (authenticated encryption and AEAD variants) for protecting data confidentiality, integrity and data-origin authentication; edition 2, published November 2020.
Abstract
This standard specifies five authenticated-encryption methods based on block-cipher algorithms and describes support for additional authenticated data (data that is integrity‑protected but not encrypted). The objectives are data confidentiality, data integrity and data-origin authentication; key management is outside the scope (see ISO/IEC 11770 for key management).
General information
- Status: Published.
- Publication date: November 2020.
- Publisher: ISO and IEC (ISO/IEC joint standard).
- ICS / categories: 35.030 (Information security).
- Edition / version: Edition 2 (2020).
- Number of pages: 26 (published edition).
Scope
Defines authenticated‑encryption methods (including AEAD variants) for processing a data string to achieve confidentiality, integrity and origin authentication. All specified methods in this edition are block‑cipher based; the standard permits dividing protected data into an encrypted portion and additional authenticated data that remains unencrypted but integrity‑protected. Key management techniques are explicitly out of scope and are referenced to ISO/IEC 11770.
Key topics and requirements
- Authenticated encryption goals: confidentiality, integrity and data‑origin authentication for protected data.
- AEAD (Authenticated Encryption with Associated Data): support for additional authenticated data that is integrity‑protected but not encrypted.
- Five block‑cipher‑based methods specified (edition 2020).
- Implementation requirements and security considerations (nonce/IV handling, tag lengths and uniqueness requirements) should be observed — guidance and related algorithm recommendations exist in NIST and IETF publications.
- Key management is outside the standard; use ISO/IEC 11770 series for keying and lifecycle management.
Typical use and users
Used by cryptographic library implementers, protocol designers, security architects, product vendors and standards committees when selecting, implementing or validating authenticated‑encryption modes for applications such as secure messaging, transport and storage. It is a normative reference for implementers who need standardized AE/AEAD methods.
Related standards
Related documents include the earlier ISO/IEC 19772:2009 (withdrawn and replaced by the 2020 edition), the ISO/IEC 11770 series for key management, NIST Special Publication 800‑38D (GCM/GMAC guidance) and IETF RFC 5116 (AEAD interface and algorithm guidance). These documents provide complementary algorithm recommendations, interface conventions and keying/nonce guidance for implementations.
Keywords
Authenticated encryption, AE, AEAD, block cipher modes, confidentiality, integrity, data‑origin authentication, additional authenticated data (AAD), nonce/IV, cryptographic modes (GCM/CCM/OCB variants).
FAQ
Q: What is this standard?
A: ISO/IEC 19772:2020 is an international standard that specifies authenticated‑encryption methods (AE/AEAD) for protecting data confidentiality, integrity and data‑origin authentication; it is the 2020 (second) edition.
Q: What does it cover?
A: It covers five block‑cipher‑based authenticated‑encryption methods and describes how associated data (AAD) can be integrity‑protected without being encrypted; it does not cover key management.
Q: Who typically uses it?
A: Cryptographic library authors, security architects, protocol designers, implementers and certification/evaluation bodies use it when selecting or implementing AE/AEAD modes.
Q: Is it current or superseded?
A: The 2020 edition (ISO/IEC 19772:2020) is the current published edition and it replaces the 2009 edition (ISO/IEC 19772:2009), which was withdrawn. The standard is subject to periodic review.
Q: Is it part of a series?
A: It is part of the ISO/IEC information‑security standards managed by ISO/IEC JTC 1/SC 27; related standards include the ISO/IEC 11770 series (key management) and various national and international recommendations (e.g., NIST SP 800‑38D) addressing specific modes and implementation guidance.
Q: What are the key keywords?
A: Authenticated encryption, AEAD, block cipher modes, confidentiality, integrity, AAD, nonce/IV, tag, GCM, CCM, OCB.