Specifies the following methods for authenticated encryption: 1. defined ways for processing a data string, 2. protection against unauthorized disclosure of data, 3. protection that enables the recipient of data to verify that it has not been modified, 4