Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

More specifically, because encryption without verification allows for MITM and other chosen-ciphertext attacks which trivially break the confidentiality provided by the encryption.

Encryption needs entity authentication (verifying who you're talking to), data authentication (verifying that the ciphertext has been created by one of the parties in the communication), and a cipher to provide confidentiality in practice.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: