diff --git a/tex/text.tex b/tex/text.tex index 89dde27..4e16487 100644 --- a/tex/text.tex +++ b/tex/text.tex @@ -101,7 +101,7 @@ distributed to the other party via untrusted channels. In 1976 Whitfield Diffie and Martin Hellman published a paper in which they devised a \emph{public-key distribution scheme}, which allows the two parties to arrive at a shared secret by exchanging information via insecure channels with the presence of an -eavesdropper. +eavesdropper. This scheme (or its variations) is in use to this day. \n{2}{Hash functions} @@ -117,11 +117,12 @@ device has come across, such as when connecting to a website protected by the famed HTTPS. The popularity stems from a common use case: the need to identify a chunk of -data. Of course, two chunks of data, two files, frames or packets could -always be compared bit by bit, but that can get prohibitive from both cost and -energy point of view relatively quickly. That is when hash functions come in, +data. Of course, two chunks of data, two files, frames or packets could always +be compared bit by bit, but that can get prohibitive from both cost and energy +point of view relatively quickly. That is when the hash functions come in, since they are able to take a long input and produce a short output, named a -digest or a hash value. +digest or a hash value. It also does not work the other way around, a file +cannot be reconstructed from the hash digest, it is a one-way function. \n{3}{Rainbow tables}