Answer the question
In order to leave comments, you need to log in
How does GCM work?
Why is this thing secure and why can't we recover the key in it?
Auth tag is the same value of the polynomial at the point H=E(0^128), in the simplest case, linear, with known coefficients. Why can't we then find H by solving a linear equation?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question