fixed one typo

This commit is contained in:
echelon2
2017-04-11 19:37:01 +00:00
parent 939f9d59fc
commit 50fcc4a9ed

View File

@@ -15,7 +15,7 @@ Overview
This page specifies the low-level details of the cryptography in I2P. This page specifies the low-level details of the cryptography in I2P.
There are a handful of cryptographic algorithms in use within I2P, but we have There are a handful of cryptographic algorithms in use within I2P, but we have
reduced them to a bare minimum to deal with our needs - one symmetric algorithm reduced them to a bare minimum to deal with our needs - one symmetric algorithm,
one asymmetric algorithm, one signing algorithm, and one hashing algorithm. one asymmetric algorithm, one signing algorithm, and one hashing algorithm.
However, we do combine them in some particular ways to provide message However, we do combine them in some particular ways to provide message
integrity (rather than relying on a MAC). In addition, as much as we hate integrity (rather than relying on a MAC). In addition, as much as we hate