diff options
author | Joey Hess <joey@kitenet.net> | 2013-03-29 18:06:14 -0400 |
---|---|---|
committer | Joey Hess <joey@kitenet.net> | 2013-03-29 18:06:14 -0400 |
commit | 72acf5d0b241a2b95c25adc94d15d3b2c72d44ee (patch) | |
tree | dd6983a11c65666d84fc748144319bdfc87a7bff /Crypto.hs | |
parent | 71760a359f5515053085f242258dc615a1db1fd8 (diff) |
minor wording fixes
Diffstat (limited to 'Crypto.hs')
-rw-r--r-- | Crypto.hs | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -47,10 +47,10 @@ import Types.Crypto - The 256 first characters that feed the MAC represent at best 192 - bytes of entropy. However that's more than enough for both the - default MAC algorithm, namely HMAC-SHA1, and the "strongest" - - currently supported, namely HMAC-SHA512, which respectively needs + - currently supported, namely HMAC-SHA512, which respectively need - (ideally) 64 and 128 bytes of entropy. - - - The remainder characters (320 bytes of entropy) is enough for GnuPG's + - The remaining characters (320 bytes of entropy) is enough for GnuPG's - symetric cipher; unlike weaker public key crypto, the key does not - need to be too large. -} |