File tree Expand file tree Collapse file tree 1 file changed +4
-2
lines changed
Expand file tree Collapse file tree 1 file changed +4
-2
lines changed Original file line number Diff line number Diff line change @@ -388,8 +388,10 @@ attack”—see the exercises for more details.
388388There have been several common cryptographic hash algorithms over the
389389years, including Message Digest 5 (MD5) and the Secure Hash Algorithm
390390(SHA) family. Weaknesses of MD5 and earlier versions of SHA have been
391- known for some time, which led NIST to recommend using SHA-3 in 2015.
392- generating an encrypted message digest, the digest encryption could use
391+ known for some time, which led NIST to develop and recommend a family
392+ of algorithms known as SHA-3 in 2015.
393+
394+ When generating an encrypted message digest, the digest encryption could use
393395either a secret-key cipher or a public-key cipher. If a public-key
394396cipher is used, the digest would be encrypted using the sender’s private
395397key (the one we normally think of as being used for decryption), and the
You can’t perform that action at this time.
0 commit comments