This article is rated Stub-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
I'd like to suggest that this is a completely unbalanced viewpoint on the "Horton principle", and that by encouraging this viewpoint Wikipedia is doing a deservice to cryptographic security. Numerous results indicate that, in fact, following the authenticate-then-encrypt approach leads to both theoretical annoyances, but, more importantly, it is much harder to implement securely as compared to encrypt-then-authenticate. Anyway there should a balanced discussion of both approaches. I can provide references.
This article is rated Stub-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
I'd like to suggest that this is a completely unbalanced viewpoint on the "Horton principle", and that by encouraging this viewpoint Wikipedia is doing a deservice to cryptographic security. Numerous results indicate that, in fact, following the authenticate-then-encrypt approach leads to both theoretical annoyances, but, more importantly, it is much harder to implement securely as compared to encrypt-then-authenticate. Anyway there should a balanced discussion of both approaches. I can provide references.