``An (interactive) key exchange protocol is a method whereby parties who do not
share any secret information can generate a shared, secret key by communicating
over a public channel. The main property guaranteed here is that an
-eavesdroppin adversary who sees all the messages sent over the communication
+eavesdropping adversary who sees all the messages sent over the communication
line does not learn anything about the resulting secret key.'' \cite{katz2008introduction}
Example: \texttt{DHE}
Examples: \texttt{SHA256}
-\todo{ explain that this is either MAC ...or ... this:}
-
\item{\it Authenticated Encryption with Associated Data (AEAD):}
-An encryption scheme which provides for confidentiality, integrity and authenticity.
-\todo{explain more? link? / reference }
+AEAD is a optional scheme and class for authenticated encryption block-cipher modes
+which take care of encryption as well as authentication (e.g. GCM, CCM mode).
Examples: \texttt{AES256-GCM}