From Wikipedia, the free encyclopedia

I'd like to suggest that this is a completely unbalanced viewpoint on the "Horton principle", and that by encouraging this viewpoint Wikipedia is doing a deservice to cryptographic security. Numerous results indicate that, in fact, following the authenticate-then-encrypt approach leads to both theoretical annoyances, but, more importantly, it is much harder to implement securely as compared to encrypt-then-authenticate. Anyway there should a balanced discussion of both approaches. I can provide references.

I 100% agree with you. But note that anyone can edit on Wikipedia. Please, go ahead, be bold! Nageh ( talk) 18:20, 14 April 2012 (UTC) reply
  • While you're at it, it wouldn't hurt to add some explanation of how the principle relates to the story of the eponymous elephant. Krychek ( talk) 17:52, 8 December 2016 (UTC) reply
From Wikipedia, the free encyclopedia

I'd like to suggest that this is a completely unbalanced viewpoint on the "Horton principle", and that by encouraging this viewpoint Wikipedia is doing a deservice to cryptographic security. Numerous results indicate that, in fact, following the authenticate-then-encrypt approach leads to both theoretical annoyances, but, more importantly, it is much harder to implement securely as compared to encrypt-then-authenticate. Anyway there should a balanced discussion of both approaches. I can provide references.

I 100% agree with you. But note that anyone can edit on Wikipedia. Please, go ahead, be bold! Nageh ( talk) 18:20, 14 April 2012 (UTC) reply
  • While you're at it, it wouldn't hurt to add some explanation of how the principle relates to the story of the eponymous elephant. Krychek ( talk) 17:52, 8 December 2016 (UTC) reply

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook