top | item 8865719

(no title)

icanhasfay | 11 years ago

Obligatory Doom principle link. http://www.thoughtcrime.org/blog/the-cryptographic-doom-prin...

Encrypt Then Authenticate, dammit!

discuss

order

meowface|11 years ago

Or, from the inverse perspective: always authenticate and/or verify the integrity of data before processing it at all, whether that processing be decryption, string manipulation, or otherwise.

StavrosK|11 years ago

Which you can't do if the MAC is within the encrypted message.