There are 4 approaches to authenticated encryption: H -> E, A-> E, E -> A, and E + A.
a. Which approach is used by CCM? Explain your answer.
b. Which approach is used by GCM? Explain your answer.
c. Draw a figure to show how can the receiver do the decryption(to get the plaintext) and make the authentication verification inCCM?
Answer