diff --git a/nettle.texinfo b/nettle.texinfo index e6c00c2251141861137118171e3887e689cc7498..c33765cb637593dcfc789f845ed28de43e018971 100644 --- a/nettle.texinfo +++ b/nettle.texinfo @@ -1190,11 +1190,11 @@ should also be hard to compute the key given only messages and corresponding @acronym{MAC}s. Keyed hash functions are useful primarily for message authentication, -when the Alice and Bob shares a secret: The sender, Alice, computes the +when Alice and Bob shares a secret: The sender, Alice, computes the @acronym{MAC} and attaches it to the message. The receiver, Bob, also computes the @acronym{MAC} of the message, using the same key, and compares that to Alice's value. If they match, Bob can be assured that -the message has not been modified on it's way from Alice. +the message has not been modified on its way from Alice. However, unlike digital signatures, this assurance is not transferable. Bob can't show the message and the @acronym{MAC} to a third party and @@ -1204,7 +1204,7 @@ sides, and anyone knowing the key can create a correct @acronym{MAC} for any message. If Bob believes that only he and Alice knows the key, and he knows that he didn't attach a @acronym{MAC} to a particular message, he knows it must be Alice who did it. However, the third party can't -distinguish between @acronym{MAC} created by Alice and one created by +distinguish between a @acronym{MAC} created by Alice and one created by Bob. Keyed hash functions are typically a lot faster than digital signatures