diff options
author | Ben | 2021-08-29 23:37:12 +0200 |
---|---|---|
committer | Ben | 2021-08-29 23:37:12 +0200 |
commit | ede16c77ae4b15bfe43433e0e41f119cf1e36f16 (patch) | |
tree | aaae1d3c1aa3242ff2c674f0d72f7f519ea20a3f | |
parent | e0f4163c7e783bca7a38a344a8201c4889eccdb7 (diff) | |
download | inexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.gz inexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.bz2 inexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.xz |
Fix typos
-rw-r--r-- | README.md | 12 |
1 files changed, 6 insertions, 6 deletions
@@ -1,9 +1,9 @@ # INadvisable EXperimental Asymmetric Crypto Tool # -Inexact is an experimental cryptographic tools, multi-platform, scriptable -complying with the KISS principle (Keep it simple and stupid). +Inexact is an experimental cryptographic tool, multi-platform, scriptable +complying with the KISS principle (Keep It Simple and Stupid). -The main features are as follow: +The main features are as follows: - Asymmetric encryption. - Symmetric encryption. @@ -13,9 +13,9 @@ The main features are as follow: - Base64 or modified base64 encoding output compatible with a URL path, DNS entry, or file name. -** WARNING : Inexact uses recent algorithms not approved nor by NIST or NSA ! ** +** WARNING : Inexact uses recent algorithms that are not approved by NIST or NSA ! ** -** Don't use for anything other than experiments. ** +** Don't use it for anything else than experiments. ** ## Encryption principles @@ -43,7 +43,7 @@ Rest of protocol: - The nonce for the Norx function of the second part is a SHA3-256 hash of parameters of the first part and rand1 buffer. - Argon2 is used as a challenge for the password of the private key. -- The symmetric encryption is based on ian asymmetric encryption by adding argon2 +- The symmetric encryption is based on the asymmetric encryption by adding argon2 challenge nonce and public key in the encrypted message. Schematic: |