The key points from this module are:
Authenticated Encryption is an encryption scheme which ensures the privacy, authenticity and integrity of messages exchanged between two parties.
An encryption scheme is an authenticated encryption scheme if it satisfies the following two properties:
It should satisfy the notion of CCA-security
It should satisfy the notion of Ciphertext integrity
The generic methods of composing CPA-secure ciphers and Secure MACs are:
Key-exchange protocols are mechanisms by which two parties that communicate over an unsafe network can generate a common secret key.
Log in to save your progress and obtain a certificate in Alison’s free Advanced Diploma in Cryptography online course
Sign up to save your progress and obtain a certificate in Alison’s free Advanced Diploma in Cryptography online course
Please enter you email address and we will mail you a link to reset your password.