4 | WeLiveSecurity

4

Figure 4: Scheme of CTR mode of operation