MAC then Encrypt? or Encrypt then MAC?

Read

https://moxie.org/blog/the-cryptographic-doom-principle/

and refer to these as needed:

http://world.std.com/~dtd/sign_encrypt/sign_encrypt7.html

http://crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign

http://crypto.stackexchange.com/questions/202/should-we-mac-then-encrypt-or-encrypt-then-mac

Write a few paragraphs - no more than 2 pages, describing the issue at a level suitable for a non-crypto, but technical reader. (Your future boss? Grant funder?) Describe the issues, which order you would recommend doing in some system you were designing that needed both MAC and encryption. Discuss Pros and Cons.

Write this to persuade someone to take your recommendation. Submit a PDF to learningsuite.

cs-465/homework-8.txt · Last modified: 2017/02/23 14:08 by fred
Back to top
CC Attribution-Share Alike 4.0 International
chimeric.de = chi`s home Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0