4 Approaches Authenticated Encryption H E E E E Approach Used Ccm Explain Answer B Appro Q37039557

There are 4 approaches to authenticated encryption: H -> E, A-> E, E -> A, and E + A.

a. Which approach is used by CCM? Explain your answer.

b. Which approach is used by GCM? Explain your answer.

c. Draw a figure to show how can the receiver do the decryption(to get the plaintext) and make the authentication verification inCCM?


Answer


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.