Hey, thanks Jeff !
I also inadvertently found an interresting article of a certain M. J. W. ...
;-)
I should have read more carefully :
http://www.codeproject.com/Articles/34380/Authenticated-Encryption
particularly when it states : "It is up to the receiver to determine
whether to accept a tag which is truncated".
I take the opportunity to thank the numerous people on this list from
whom I have learned a lot reading at their posts,
I cannot name them all, but Dave if one of them.
Le 19/06/2014 11:19, Jeffrey Walton a écrit :
If AEAD schemes are your thing, then you might take a look at David
Wagner's http://www.cs.berkeley.edu/~daw/talks/FSE04eax.ppt. Slide 7
has a nice comparison of CCM, CWC, EAX and GCM modes of operation.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org