The property that data originated from its purported source.
Sources:
NIST SP 800-38B
under Authenticity
NIST SP 800-38C
under Authenticity
NIST SP 800-38D
under Authenticity
NIST SP 800-63-3
under Authenticity
The property that data originated from its purported source. In the context of a key-wrap algorithm, the source of authentic data is an entity with access to an implementation of the authenticated-encryption function with the KEK.
Sources:
NIST SP 800-38F
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
Sources:
NIST SP 800-37 Rev. 2
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator. See Authentication.
Sources:
CNSSI 4009-2015
from
NIST SP 800-39
NIST SP 800-137
under Authenticity
from
CNSSI 4009
NIST SP 800-18 Rev. 1
under Authenticity
NIST SP 800-39
under Authenticity
NIST SP 800-60 Vol. 1 Rev. 1
under Authenticity
NIST SP 800-60 Vol. 2 Rev. 1
under Authenticity
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, message, or message originator. See authentication.
Sources:
NIST SP 800-53 Rev. 5
The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator
Sources:
NIST SP 800-30 Rev. 1
under Authenticity