The Cryptographic Doom Principle

When it comes to designing secure protocols, I have a principle that goes like this: if you have to
perform any cryptographic operation before verifying the
MAC on a message you’ve received, it will
somehow inevitably lead to doom.

Uncategorized