1. Modify the algorithms for the secure channel in this chapter to use the a dedicated, single-key mode for providing both encryption and authentication. You can use OCB, CCM, CWC, or GCM as a black box.
2. Compare and contrast the advantages and disadvantages among the different orders of applying encryption and authentication when creating a secure channel.