Skip to content

Commit 255d158

Browse files
committed
minor edits
1 parent 0375140 commit 255d158

File tree

2 files changed

+11
-9
lines changed

2 files changed

+11
-9
lines changed

crypto.rst

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -144,14 +144,16 @@ attack.
144144
It turns out that it is not trivial to create cryptographic ciphers
145145
that can be broken only by brute force. For example, the original DES
146146
(data encryption standard) algorithm had a key of only 56 bits; when
147-
it became clear that 56 bits was too small, triple DES was introduced, using three
148-
rounds of DES each with its own key. It might seem that this
149-
increased the key size to 168 bits (:math:`3 \times 56`) but because
150-
of the 3-round structure of triple DES, the attacker only has to
151-
search a key space of 112 bits. This depends on something called a
152-
"meet-in-the-middle attack". The details are not important here but it
153-
illustrates why cryptographic algorithms need to be designed
154-
carefully if they are not to contain surprising weaknesses.
147+
it became clear that 56 bits was too small, triple DES was introduced,
148+
using three rounds of DES each with its own key. It might seem that
149+
this increased the key size to 168 bits (:math:`3 \times 56`) but
150+
because of the 3-round structure of triple DES, an attacker in
151+
possession of a piece of ciphertext and the matching plaintext only
152+
has to search a key space of 112 bits. This depends on something
153+
called a "meet-in-the-middle attack". The details are not important
154+
here but it illustrates why cryptographic algorithms need to be
155+
designed carefully and evaluated by experts if they are not to contain
156+
surprising weaknesses.
155157

156158
Network security tends to focus on the security of data as it
157159
moves through the network—that is, data that is vulnerable for only a

key-distro.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -299,7 +299,7 @@ representations of the CRL to reduce its size, and the development of
299299
the Online Certification Status Protocol (OCSP) to enable real-time
300300
checks on a certificate's status. At the time of writing, there are
301301
some best practices for handling certificate revocation but no
302-
comprehensive solution.
302+
comprehensive solution.
303303

304304
4.2 Distribution of Secret Keys
305305
------------------------------------

0 commit comments

Comments
 (0)