In this chapter we’ll be covering some advanced symmetric cryptography, and we’ll get deeper into authenticated encryption.
Let’s dive right into an example and some code using AES-GCM.
Alice and Bob have had a few close calls with Eve over the past month. During that time, they have been exchanging USB drives with encrypted files. This has worked out for them so far, but they seem to have trouble remembering a handful of key things: that they ...