Generation-Encryption: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
The process of CCM in which a MAC is generated on the payload and the associated data, and encryption is applied to the payload and the MAC.
Source: NIST SP 800-38C | Category: