File tree Expand file tree Collapse file tree 2 files changed +11
-2
lines changed
Expand file tree Collapse file tree 2 files changed +11
-2
lines changed Original file line number Diff line number Diff line change @@ -62,9 +62,16 @@ since it takes a lot of work to develop (and establish the security
6262of) a new cipher. In the pre-computer era, ciphers were often
6363implemented by specialized hardware such as the Enigma machine; these
6464could not be easily replaced, but were re-keyed frequently. Today's
65- algorithms, while implemented in software, are the result of length
65+ algorithms, while implemented in software, are the result of lengthy
6666processes of development, testing, analysis and standardization; all
67- of this makes the expensive to replace.
67+ of this makes the algorithms expensive to replace.
68+
69+ Because cryptography algorithms are expensive to replace, they are
70+ typically treated as plugable modules in the end-to-end security
71+ solutions described in the following chapters. In many cases, the
72+ algorithm is a selectable parameter of those solutions, which means
73+ the overall system does not become obsolete just because one of its
74+ cryptography modules needs to be deprecated.
6875
6976Also, one of the best ways to know that a cipher is secure is to use
7077it for a long time—the longer it goes unbroken, the better the chance
Original file line number Diff line number Diff line change @@ -262,6 +262,7 @@ parallelized
262262parameterizing
263263performant
264264plaintext
265+ plugable
265266pre
266267preconfigured
267268predistribute
@@ -286,6 +287,7 @@ rollout
286287runtime
287288scalably
288289schedulable
290+ selectable
289291serverless
290292siloed
291293spacings
You can’t perform that action at this time.
0 commit comments