We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent da321ff commit 3b23877Copy full SHA for 3b23877
crypto.rst
@@ -388,7 +388,10 @@ attack”—see the exercises for more details.
388
There have been several common cryptographic hash algorithms over the
389
years, including Message Digest 5 (MD5) and the Secure Hash Algorithm
390
(SHA) family. Weaknesses of MD5 and earlier versions of SHA have been
391
-known for some time, which led NIST to recommend using SHA-3 in 2015.
+known for some time, which led NIST to recommend using a family of hashes
392
+known as SHA-3 in 2015.
393
+
394
+When
395
generating an encrypted message digest, the digest encryption could use
396
either a secret-key cipher or a public-key cipher. If a public-key
397
cipher is used, the digest would be encrypted using the sender’s private
0 commit comments