Which Authentication Encryption approach is taken by the SSL/TLS protocol?
(a) Hashing followed by encryption (H→E)
(b) Encryption followed by authentication (E→A)
(c) Authentication followed by encryption (A→E)
(d) Independently encrypt and authenticate (E + A)
This question was posed to me by my college director while I was bunking the class.
This question is from CCM, GCM and Key Wrapping in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security