Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

authenticity

Abbreviation(s) and Synonym(s):

None

Definition(s):

  The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See Authentication.
Source(s):
NIST SP 800-137 under Authenticity (CNSSI 4009)
NIST SP 800-30 Rev. 1 under Authenticity (CNSSI 4009)
NIST SP 800-39 under Authenticity
NIST SP 800-53 Rev. 4 under Authenticity
NIST SP 800-53A Rev. 4 under Authenticity

  The property that data originated from its purported source.
Source(s):
NIST SP 800-38B under Authenticity
NIST SP 800-38C under Authenticity
NIST SP 800-38D under Authenticity
NIST SP 800-63-2 under Authenticity [Superseded]
NIST SP 800-63-3 under Authenticity

  The property that data originated from its purported source. In the context of a key-wrap algorithm, the source of authentic data is an entity with access to an implementation of the authenticated-encryption function with the KEK.
Source(s):
NIST SP 800-38F

  The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See authentication.
Source(s):
CNSSI 4009-2015 (NIST SP 800-53 Rev. 4, NIST SP 800-53A Rev. 1, NIST SP 800-39)
NIST SP 800-18 Rev. 1 under Authenticity
NIST SP 800-60 Vol. 1 Rev. 1 under Authenticity
NIST SP 800-60 Vol. 2 Rev. 1 under Authenticity