This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
I'd like to suggest that this is a completely unbalanced viewpoint on the "Horton principle", and that by encouraging this viewpoint Wikipedia is doing a deservice to cryptographic security. Numerous results indicate that, in fact, following the authenticate-then-encrypt approach leads to both theoretical annoyances, but, more importantly, it is much harder to implement securely as compared to encrypt-then-authenticate. Anyway there should a balanced discussion of both approaches. I can provide references.
- I 100% agree with you. But note that anyone can edit on Wikipedia. Please, go ahead, be bold! Nageh (talk) 18:20, 14 April 2012 (UTC)
- While you're at it, it wouldn't hurt to add some explanation of how the principle relates to the story of the eponymous elephant. Krychek (talk) 17:52, 8 December 2016 (UTC)