Skip to content

Commit a237863

Browse files
committed
fix whitespace
1 parent 61b2b42 commit a237863

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

authentication.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Another approach is to include a *nonce*—a random number used only
7171
once—in the message. Participants can then detect replay attacks by
7272
checking whether a nonce has been used previously. On its own, this
7373
would require keeping track of past nonces, of which a great many could
74-
accumulate.
74+
accumulate.
7575

7676
A solution to the shortcomings of timestamps and nonces is to use one
7777
or both of them in a *challenge-response* protocol. Suppose we use a
@@ -246,7 +246,7 @@ readable by Bob, because it is encrypted with his master key, and a
246246
session key that is encrypted using the key shared by Alice and the
247247
TGS. Alice can now start communicating with Bob, sending the ticket
248248
and another encrypted timestamp using the newly provided session key.
249-
249+
250250
In the client/server application domain for which Kerberos is
251251
intended, it is reasonable to assume a degree of clock
252252
synchronization. This allows Kerberos to use timestamps and lifespans

crypto.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -633,7 +633,7 @@ integrated algorithms that produce both ciphertext and authentication
633633
codes using a combination of ciphers and hash functions.
634634

635635
If you want to get a deeper understanding of the principles of ciphers
636-
and hash functions, among other cryptographic concepts, we recommend the following book.
636+
and hash functions, among other cryptographic concepts, we recommend the following book.
637637

638638
.. admonition:: Further Reading
639639

0 commit comments

Comments
 (0)