Generally, why we need the secrecy of Hash value? Mostly, the researchers claim that the Encrypt then MAC is more suitable approach to implemented AE. They follows the rules like always compute the MACs on the ciphertext, never on the plaintext and used different keys for Encryption and MAC. Can anyone help me to explain the suitable structure for implementing AE and Which kind of Attacks are possible under which situation?