1. 5

pg. 5 gives a quick overview of Fergusons nonce reuse attack http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf and his paper that goes into more depth: Authentication weaknesses in GCM

  1.