Commit 37540091 authored by Niels Möller's avatar Niels Möller

Fixed MAC typos noticed by Linus Nordberg.

Rev: src/nettle/nettle.texinfo:1.27
parent 169282fe
...@@ -1190,11 +1190,11 @@ should also be hard to compute the key given only messages and ...@@ -1190,11 +1190,11 @@ should also be hard to compute the key given only messages and
corresponding @acronym{MAC}s. corresponding @acronym{MAC}s.
Keyed hash functions are useful primarily for message authentication, Keyed hash functions are useful primarily for message authentication,
when the Alice and Bob shares a secret: The sender, Alice, computes the when Alice and Bob shares a secret: The sender, Alice, computes the
@acronym{MAC} and attaches it to the message. The receiver, Bob, also computes @acronym{MAC} and attaches it to the message. The receiver, Bob, also computes
the @acronym{MAC} of the message, using the same key, and compares that the @acronym{MAC} of the message, using the same key, and compares that
to Alice's value. If they match, Bob can be assured that to Alice's value. If they match, Bob can be assured that
the message has not been modified on it's way from Alice. the message has not been modified on its way from Alice.
However, unlike digital signatures, this assurance is not transferable. However, unlike digital signatures, this assurance is not transferable.
Bob can't show the message and the @acronym{MAC} to a third party and Bob can't show the message and the @acronym{MAC} to a third party and
...@@ -1204,7 +1204,7 @@ sides, and anyone knowing the key can create a correct @acronym{MAC} for ...@@ -1204,7 +1204,7 @@ sides, and anyone knowing the key can create a correct @acronym{MAC} for
any message. If Bob believes that only he and Alice knows the key, and any message. If Bob believes that only he and Alice knows the key, and
he knows that he didn't attach a @acronym{MAC} to a particular message, he knows that he didn't attach a @acronym{MAC} to a particular message,
he knows it must be Alice who did it. However, the third party can't he knows it must be Alice who did it. However, the third party can't
distinguish between @acronym{MAC} created by Alice and one created by distinguish between a @acronym{MAC} created by Alice and one created by
Bob. Bob.
Keyed hash functions are typically a lot faster than digital signatures Keyed hash functions are typically a lot faster than digital signatures
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment