Which Authentication Encryption approach is taken by the SSH protocol?
(a) Hashing followed by encryption (H→E)
(b) Encryption followed by authentication (E→A)
(c) Authentication followed by encryption (A→E)
(d) Independently encrypt and authenticate (E + A)
I had been asked this question in examination.
My question is from CCM, GCM and Key Wrapping topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security