The program requires use of AES GCM mode encryption and decryption methods. This is usually done using a secret key and authentication tag.
確定! 回上一頁