Generation-Encryption: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
The process of CCM in which a MAC is generated on the payload and the associated data, and encryption is applied to the payload and the MAC.
Source: NIST SP 800-38C | Category: