Authenticated Encryption with Associated Data
GPTKB entity
Statements (46)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:defines |
gptkb:ISO/_IEC_19772
NISTSP 800-38 D |
https://www.w3.org/2000/01/rdf-schema#label |
Authenticated Encryption with Associated Data
|
gptkbp:is_adopted_by |
gptkb:financial_services_company
E-commerce platforms Cloud storage services Messaging services |
gptkbp:is_characterized_by |
Key management
Associated data handling Nonce usage Encryption and authentication in a single operation |
gptkbp:is_documented_in |
gptkb:RFC_8439
gptkb:RFC_7539 gptkb:ISO/_IEC_18033-4 gptkb:RFC_5116 |
gptkbp:is_evaluated_by |
Cryptanalysis
Security audits Compliance standards |
gptkbp:is_implemented_in |
gptkb:SSH
gptkb:motorcycle TLS |
gptkbp:is_promoted_by |
Security organizations
Industry standards bodies Cryptography researchers |
gptkbp:is_related_to |
gptkb:currency
Data security Network security |
gptkbp:is_supported_by |
Cryptographic libraries
Hardware security modules Software development kits |
gptkbp:is_used_by |
Web applications
Mobile applications |
gptkbp:is_used_in |
Secure communications
|
gptkbp:is_vulnerable_to |
Man-in-the-middle attacks
Chosen ciphertext attacks Replay attacks |
gptkbp:provides |
Data integrity
Data confidentiality Data authenticity |
gptkbp:purpose |
Provide confidentiality and integrity
|
gptkbp:suitable_for |
Separate encryption and authentication
|
gptkbp:uses |
Encryption algorithms
Message Authentication Codes |
gptkbp:bfsParent |
gptkb:AEAD_cipher_suites
|
gptkbp:bfsLayer |
5
|