top | item 8865719 (no title) icanhasfay | 11 years ago Obligatory Doom principle link. http://www.thoughtcrime.org/blog/the-cryptographic-doom-prin...Encrypt Then Authenticate, dammit! discuss order hn newest meowface|11 years ago Or, from the inverse perspective: always authenticate and/or verify the integrity of data before processing it at all, whether that processing be decryption, string manipulation, or otherwise. StavrosK|11 years ago Which you can't do if the MAC is within the encrypted message. load replies (1)
meowface|11 years ago Or, from the inverse perspective: always authenticate and/or verify the integrity of data before processing it at all, whether that processing be decryption, string manipulation, or otherwise. StavrosK|11 years ago Which you can't do if the MAC is within the encrypted message. load replies (1)
StavrosK|11 years ago Which you can't do if the MAC is within the encrypted message. load replies (1)
meowface|11 years ago
StavrosK|11 years ago