@@ -598,6 +598,8 @@ recomputed code to the code received in the message.
598598
599599 Computing a hashed message authentication code (HMAC).
600600
601+ .. this appears to be out of date, see https://en.wikipedia.org/wiki/HMAC#Design_principles
602+
601603 One way to implement the approach just described is to apply a cryptographic hash (such as
602604SHA-3) to the concatenation of the plaintext message and the
603605secret value, as illustrated in :numref: `Figure %s
@@ -624,13 +626,13 @@ In recent years, the idea of using a single algorithm to support both
624626authentication and encryption has gained support for reasons of
625627performance and simplicity of implementation. This is referred to as
626628*authenticated encryption * or *authenticated encryption with
627- associated data *. The latter term allows for some data fields
628- (e.g., packet headers) to be transmitted as plaintext—these are the
629- associated data—while the rest
630- of the message is encrypted, and the whole thing, headers included, is
631- authenticated. We won't go into details here, but there is now a set of
632- integrated algorithms that produce both ciphertext and authentication
633- codes using a combination of ciphers and hash functions.
629+ associated data *. The latter term allows for some data fields (e.g.,
630+ packet headers) to be transmitted as plaintext—these are the
631+ associated data—while the rest of the message is encrypted, and the
632+ whole thing, headers included, is authenticated. We won't go into
633+ details here, but there is now a set of integrated algorithms that
634+ produce both ciphertext and authentication codes using a combination
635+ of ciphers and hash functions.
634636
635637If you want to get a deeper understanding of the principles of ciphers
636638and hash functions, among other cryptographic concepts, we recommend the following book.
0 commit comments