Fossil SCM

Fix a typo in the hashpolicy.wiki document.

drh 2019-01-07 01:32 trunk
Commit 3b17294dfe5b48365edf4c0287e28698dad2ac8c17f0a171d6e9346d446d10a6
1 file changed +1 -1
--- www/hashpolicy.wiki
+++ www/hashpolicy.wiki
@@ -40,11 +40,11 @@
4040
the internal SHA1 implementation was changed from a generic
4141
FIPS PUB 180-4 SHA1 implementation to a "Hardened SHA1"
4242
[[https://github.com/cr-marcstevens/sha1collisiondetection|1]]
4343
[[https://marc-stevens.nl/research/papers/C13-S.pdf|2]].
4444
45
-The Hardened SHA1 implement automatically detects when the artifact
45
+The Hardened SHA1 algorithm automatically detects when the artifact
4646
being hashed is specifically designed to exploit the known weaknesses
4747
in the SHA1 algorithm, and when it detects such an attack it changes
4848
the hash algorithm (by increasing the number of rounds in the compression
4949
function) to make the algorithm secure again. If the attack detection
5050
gets a false possible, that means that Hardened SHA1 will get a different
5151
--- www/hashpolicy.wiki
+++ www/hashpolicy.wiki
@@ -40,11 +40,11 @@
40 the internal SHA1 implementation was changed from a generic
41 FIPS PUB 180-4 SHA1 implementation to a "Hardened SHA1"
42 [[https://github.com/cr-marcstevens/sha1collisiondetection|1]]
43 [[https://marc-stevens.nl/research/papers/C13-S.pdf|2]].
44
45 The Hardened SHA1 implement automatically detects when the artifact
46 being hashed is specifically designed to exploit the known weaknesses
47 in the SHA1 algorithm, and when it detects such an attack it changes
48 the hash algorithm (by increasing the number of rounds in the compression
49 function) to make the algorithm secure again. If the attack detection
50 gets a false possible, that means that Hardened SHA1 will get a different
51
--- www/hashpolicy.wiki
+++ www/hashpolicy.wiki
@@ -40,11 +40,11 @@
40 the internal SHA1 implementation was changed from a generic
41 FIPS PUB 180-4 SHA1 implementation to a "Hardened SHA1"
42 [[https://github.com/cr-marcstevens/sha1collisiondetection|1]]
43 [[https://marc-stevens.nl/research/papers/C13-S.pdf|2]].
44
45 The Hardened SHA1 algorithm automatically detects when the artifact
46 being hashed is specifically designed to exploit the known weaknesses
47 in the SHA1 algorithm, and when it detects such an attack it changes
48 the hash algorithm (by increasing the number of rounds in the compression
49 function) to make the algorithm secure again. If the attack detection
50 gets a false possible, that means that Hardened SHA1 will get a different
51

Keyboard Shortcuts

Open search /
Next entry (timeline) j
Previous entry (timeline) k
Open focused entry Enter
Show this help ?
Toggle theme Top nav button