Professional Documents
Culture Documents
Correctness
Ek Ek Ek Ek Ek
k k
t = Mack (H(m))
k k
secure channel
t
t = Mack (H(m))
I I will skip the details of it. Interested ones may refer to books
or may consult with me offline.
Authenticated Encryption
I Ideally, we require secrecy and message authentication both in
an encryption scheme.
c, t
k1 , k2 k1 , k2
public channel
c, t
k1 , k2 k1 , k2
public channel
c = Enck1 (m) ?
1 = Vrfyk2 (c, t)
t = Mack2 (c) m = Deck1 (c)