TLS Essentials 6: Authenticity with MACs, Encrypt-then-MAC and GCM

Поділитися
Вставка
  • Опубліковано 21 жов 2024

КОМЕНТАРІ • 1

  • @arturaugustyniak212
    @arturaugustyniak212 Рік тому

    While at high level I do understand AEAD scheme rationale (data bound to session - you prevent i.e. replay attacks) i can't see other pros of encrypt than mac over just encryption than just hope that only one of two keys can leak. What's missing in my head? :) Btw. your courses are killers. They are very helpful in day to day work :)