Hashing followed by encryption (H→E) is used by which algorithm?
(a) IPSec
(b) SSH
(c) WEP
(d) SSL/TLS
I had been asked this question by my college professor while I was bunking the class.
This key question is from CCM, GCM and Key Wrapping in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security