Loading

Module 1: Authenticated Encryption Schemes

Notes
Study Reminders
Support
Text Version

Authenticated Encryption Schemes - Lesson Summary

Set your study reminders

We will email you at these times to remind you to study.
  • Monday

    -

    7am

    +

    Tuesday

    -

    7am

    +

    Wednesday

    -

    7am

    +

    Thursday

    -

    7am

    +

    Friday

    -

    7am

    +

    Saturday

    -

    7am

    +

    Sunday

    -

    7am

    +

The key points from this module are:
Authenticated Encryption is an encryption scheme which ensures the privacy, authenticity and integrity of messages exchanged between two parties.
 
An encryption scheme is an authenticated encryption scheme if it satisfies the following two properties:


It should satisfy the notion of CCA-security
It should satisfy the notion of Ciphertext integrity

The generic methods of composing CPA-secure ciphers and Secure MACs are:

Encrypt-then-authenticate
Authenticate-then-encrypt
Encrypt-and-authenticate

Key-exchange protocols are mechanisms by which two parties that communicate over an unsafe network can generate a common secret key.