Explanation may include
- modes of operation
- low-power devices
- low latency
- high resiliency
- supporting confidentiality
- supporting integrity
- supporting obfuscation
- supporting authentication
- supporting nonrepudiation
- resource vs. security constraints.
Process/Skill Question:
- What are the different modes of operation?
- Which cryptographic technique would be used to support integrity?
- Why must more efficient cryptography methods be implemented for low-power devices?