Keywords :
cryptography; authenticated encryption; online encryption; slow legacy networks; streamwise model; Computational modeling; Encryption; Legacy systems; Online services; Protocols; Distributed computing; authentication; encryption; legacy networks;