Completion requirements
View
This video shows you how to apply symmetric encryption to build a MAC. Pay close attention to how, if needed, confidentiality can be added to the system. Notice that when confidentiality is added to the authenticator, two keys are necessary to achieve authentication and confidentiality.
Source: Steven Gordon, https://www.youtube.com/watch?v=Sy765kScUHs This work is licensed under a Creative Commons Attribution 3.0 License.