How many passes through the plaintext does the CCM require to generate the MAC value?
(a) 2
(b) 3
(c) 4
(d) 5
I got this question in a job interview.
This interesting question is from CCM, GCM and Key Wrapping topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security