Authenticity

The property that data originated from its purported source.

See NIST SP 800-38B under Authenticity, NIST SP 800-38C under Authenticity, NIST SP 800-38D under Authenticity, NIST SP 800-63-3 under Authenticity for more information.

The property that data originated from its purported source. In the context of a key-wrap algorithm, the source of authentic data is an entity with access to an implementation of the authenticated-encryption function with the KEK.

See NIST SP 800-38F for more information.

The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See Authentication.See CNSSI 4009-2015 from NIST SP 800-39 , NIST SP 800-137 under Authenticity from CNSSI 4009, NIST SP 800-18 Rev. 1 under Authenticity, NIST SP 800-39 under Authenticity, NIST SP 800-60 Vol. 1 Rev. 1 under Authenticity, NIST SP 800-60 Vol. 2 Rev. 1 under Authenticity for more information.

Share this Post