Survey of design and security evaluation of authenticated encryption algorithms in theCAESARcompetition