@@ -80,12 +80,12 @@ there are plenty of people who will try to break ciphers and who will
8080let it be widely known when they have succeeded.
8181
8282Parameterizing a cipher with keys provides us with what is in effect a
83- very large family of ciphers; by switching keys, we are
83+ very large family of ciphers; by switching keys, we are
8484switching to another cipher in the family. It is common to limit the amount
8585of data that a *cryptanalyst * (code-breaker) can access before the key
8686changes. This provides the attacker with less ability to break the cipher
8787(for reasons discussed below) and limits the damage done if the code is
88- broken.
88+ broken.
8989
9090The basic requirement for an encryption algorithm is that it turns
9191plaintext into ciphertext in such a way that only the intended
@@ -109,7 +109,7 @@ session. Common headers appear at the start of HTTP messages. This may
109109enable a *known plaintext * attack, which has a much higher chance of
110110success than a *ciphertext only * attack. Even better is a *chosen
111111plaintext * attack, which may be enabled by feeding some information to
112- the sender that you know the sender is likely to transmit.
112+ the sender that you know the sender is likely to transmit.
113113
114114The best cryptographic algorithms, therefore, can prevent the attacker
115115from deducing the key even when the individual knows both the
@@ -135,7 +135,7 @@ It turns out that it is not trivial to create cryptographic ciphers
135135that can be broken only by brute force. For example, the original DES
136136(data encryption standard) algorithm had a key of only 56 bits; when
137137it became clear that 56 bits was too small, triple DES was introduced, using three
138- rounds of DES each with its own key. It might seem that this
138+ rounds of DES each with its own key. It might seem that this
139139increased the key size to 168 bits (:math: `3 \times 56 `) but because
140140of the 3-round structure of triple DES, the attacker only has to
141141search a key space of 112 bits. This depends on something called a
@@ -212,7 +212,7 @@ to be an issue is available at the "Sweet32" website.
212212.. admonition :: Further Reading
213213
214214 Sweet32. `Birthday attacks on 64-bit block ciphers in TLS and OpenVPN
215- <https://sweet32.info> `__.
215+ <https://sweet32.info> `__.
216216
217217
218218
@@ -237,11 +237,11 @@ two participants use different keys.)
237237 secure communication since that is a common networking term to
238238 identify the two endpoints of a communication channel. In the
239239 security world, the parties are often called *principals *.
240-
240+
241241 The U.S. National Institute of Standards and Technology (NIST) has
242242issued standards for a series of secret-key ciphers. *Data Encryption
243243Standard * (DES) was the first, and it survived for several decades
244- before being deprecated.
244+ before being deprecated.
245245
246246DES keys have 56 independent bits (although they have 64 bits
247247in total; the last bit of every byte is a parity bit). As noted above,
@@ -284,7 +284,7 @@ Bruce Schneier puts it this way:
284284 hard. What is hard is creating an algorithm that no one else can
285285 break, even after years of analysis. And the only way to prove that
286286 is to subject the algorithm to years of analysis by the best
287- cryptographers around.
287+ cryptographers around.
288288
2892893.3 Public-Key Ciphers
290290------------------------
@@ -355,7 +355,7 @@ confidentiality to secret-key ciphers. The symmetric key sent over
355355this confidential channel is called a *session key *. The reasons for this two-step
356356approach include the higher efficiency of secret-key ciphers, and the need
357357for reasonably frequent changing of encryption keys as described
358- above.
358+ above.
359359
360360.. _fig-pksign :
361361.. figure :: figures/f08-04-9780123850591.png
@@ -470,7 +470,7 @@ Suppose that an adversary intercepts the message on its way to the
470470receiver and tries to modify the transmitted message in
471471some way. The message digest for this corrupted message would (with
472472very high likelihood) differ from that of the original message. And
473- the adversary lacks the necessary key to
473+ the adversary lacks the necessary key to
474474encrypt the digest of the corrupted message. An adversary could,
475475however, obtain the plaintext original message and its encrypted digest
476476by eavesdropping. The adversary could then (since the hash function is
@@ -511,7 +511,7 @@ cipher is used, the digest is encrypted using the sender’s private
511511key, and the
512512receiver—or anyone else—could decrypt the digest using the sender’s
513513public key. If a secret-key cipher is used, the sender and receiver
514- have to agree on the secret key ahead of time using some other means.
514+ have to agree on the secret key ahead of time using some other means.
515515
516516A digest encrypted with a public-key algorithm using the private
517517key of the sender
@@ -527,7 +527,7 @@ message herself. Any public-key cipher can be used for digital
527527signatures. NIST has produced a series of *Digital Signature
528528Standards * (DSS). The most recent standard at the time of writing
529529allows for the use of three public-key ciphers, one based on RSA,
530- another based on elliptic curves, and
530+ another based on elliptic curves, and
531531and a third called the *Edwards-Curve Digital Signature Algorithm *.
532532
533533.. should check the above for updates
@@ -580,7 +580,7 @@ associated data—while the rest
580580of the message is encrypted, and the whole thing, headers included, is
581581authenticated. We won't go into details here, but there is now a set of
582582integrated algorithms that produce both ciphertext and authentication
583- codes using a combination of ciphers and hash functions.
583+ codes using a combination of ciphers and hash functions.
584584
585585
586586Now that we have seen some of the building blocks for encryption and
0 commit comments