-
Authenticated-Encryption with Associated-Data (AEAD) schemes provide confidentiality by encrypting the data, and also provide authenticity assurances by creating a MAC tag over the encrypted data. The…
-
It would be nice for SES to provide some ways to authenticate the ciphertexts (e.g, attach a MAC).
-
The existing example uses secret-key authentication and secret-key encryption in the usual verify-then-decrypt manner. Perhaps there would be proof niceness to be gained by defining proof rules for th…
-
Unfortunately, Ruby's OpenSSL plugin as shipped with v0.1.4 doesn't support any authenticated encryption algorithms, so it's impossible to tell if anyone tampered with my data after encryption. This i…
-
https://github.com/edauterman/hsm-impl/blob/66e816ca1900977520e4d34886c488f2c793af29/agent/punc_enc.c#L21
Should we be using some authenticated encryption mode (e.g., GCM) instead of ECB mode here?
-
In appendix 4 of the documentation (page 68 in the PDF), it mentions two sets of keys:
- Digital Signatures
- Authenticated message Encryption
The document goes on to explain how to use the dig…
-
Particularly in the streaming case, where decryption happens and may result in content being played back to the user, authentication of the message (i.e. confirming the hash matches) only happens at t…
-
Currently we don't have traits/types for authenticated encryption (without associated data). We could implement EtM, E&M and MTE constructs generically over stream ciphers/block modes and MACs. But it…
-
I am curious about the applicability of authenticated encryption to this spec. E.g., ECDH-1PU [IETF draft](https://tools.ietf.org/html/draft-madden-jose-ecdh-1pu-02).
-
### This issue is unique.
- [X] I have used the [search tool](https://github.com/ONLYOFFICE/DesktopEditors/issues?q=) and did not find an issue describing my idea.
### Your idea.
On the incoming Li…