Skip to content

Commit ad53e14

Browse files
committed
typo + forward ref
1 parent fd007da commit ad53e14

File tree

2 files changed

+11
-2
lines changed

2 files changed

+11
-2
lines changed

crypto.rst

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,16 @@ since it takes a lot of work to develop (and establish the security
6262
of) a new cipher. In the pre-computer era, ciphers were often
6363
implemented by specialized hardware such as the Enigma machine; these
6464
could not be easily replaced, but were re-keyed frequently. Today's
65-
algorithms, while implemented in software, are the result of length
65+
algorithms, while implemented in software, are the result of lengthy
6666
processes of development, testing, analysis and standardization; all
67-
of this makes the expensive to replace.
67+
of this makes the algorithms expensive to replace.
68+
69+
Because cryptography algorithms are expensive to replace, they are
70+
typically treated as plugable modules in the end-to-end security
71+
solutions described in the following chapters. In many cases, the
72+
algorithm is a selectable parameter of those solutions, which means
73+
the overall system does not become obsolete just because one of its
74+
cryptography modules needs to be deprecated.
6875

6976
Also, one of the best ways to know that a cipher is secure is to use
7077
it for a long time—the longer it goes unbroken, the better the chance

dict.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -262,6 +262,7 @@ parallelized
262262
parameterizing
263263
performant
264264
plaintext
265+
plugable
265266
pre
266267
preconfigured
267268
predistribute
@@ -286,6 +287,7 @@ rollout
286287
runtime
287288
scalably
288289
schedulable
290+
selectable
289291
serverless
290292
siloed
291293
spacings

0 commit comments

Comments
 (0)