From ad53e14b7955ebf43ca07774931e72d1c3b1f9d2 Mon Sep 17 00:00:00 2001 From: Larry Peterson Date: Thu, 23 Jan 2025 15:11:09 -0700 Subject: [PATCH] typo + forward ref --- crypto.rst | 11 +++++++++-- dict.txt | 2 ++ 2 files changed, 11 insertions(+), 2 deletions(-) diff --git a/crypto.rst b/crypto.rst index 0bf6b28..54dde7b 100644 --- a/crypto.rst +++ b/crypto.rst @@ -62,9 +62,16 @@ since it takes a lot of work to develop (and establish the security of) a new cipher. In the pre-computer era, ciphers were often implemented by specialized hardware such as the Enigma machine; these could not be easily replaced, but were re-keyed frequently. Today's -algorithms, while implemented in software, are the result of length +algorithms, while implemented in software, are the result of lengthy processes of development, testing, analysis and standardization; all -of this makes the expensive to replace. +of this makes the algorithms expensive to replace. + +Because cryptography algorithms are expensive to replace, they are +typically treated as plugable modules in the end-to-end security +solutions described in the following chapters. In many cases, the +algorithm is a selectable parameter of those solutions, which means +the overall system does not become obsolete just because one of its +cryptography modules needs to be deprecated. Also, one of the best ways to know that a cipher is secure is to use it for a long time—the longer it goes unbroken, the better the chance diff --git a/dict.txt b/dict.txt index b8725e4..8be4886 100644 --- a/dict.txt +++ b/dict.txt @@ -262,6 +262,7 @@ parallelized parameterizing performant plaintext +plugable pre preconfigured predistribute @@ -286,6 +287,7 @@ rollout runtime scalably schedulable +selectable serverless siloed spacings