Skip to content

Commit d6aa265

Browse files
authored
Repair sentence fragment in message authentication section
1 parent 9b2703f commit d6aa265

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

security/crypto.rst

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -388,8 +388,10 @@ attack”—see the exercises for more details.
388388
There have been several common cryptographic hash algorithms over the
389389
years, including Message Digest 5 (MD5) and the Secure Hash Algorithm
390390
(SHA) family. Weaknesses of MD5 and earlier versions of SHA have been
391-
known for some time, which led NIST to recommend using SHA-3 in 2015.
392-
generating an encrypted message digest, the digest encryption could use
391+
known for some time, which led NIST to develop and recommend a family
392+
of algorithms known as SHA-3 in 2015.
393+
394+
When generating an encrypted message digest, the digest encryption could use
393395
either a secret-key cipher or a public-key cipher. If a public-key
394396
cipher is used, the digest would be encrypted using the sender’s private
395397
key (the one we normally think of as being used for decryption), and the

0 commit comments

Comments
 (0)