aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen2021-08-29 23:37:12 +0200
committerBen2021-08-29 23:37:12 +0200
commitede16c77ae4b15bfe43433e0e41f119cf1e36f16 (patch)
treeaaae1d3c1aa3242ff2c674f0d72f7f519ea20a3f
parente0f4163c7e783bca7a38a344a8201c4889eccdb7 (diff)
downloadinexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.gz
inexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.bz2
inexact-ede16c77ae4b15bfe43433e0e41f119cf1e36f16.tar.xz
Fix typos
-rw-r--r--README.md12
1 files changed, 6 insertions, 6 deletions
diff --git a/README.md b/README.md
index a5db4fa..02c13c8 100644
--- a/README.md
+++ b/README.md
@@ -1,9 +1,9 @@
# INadvisable EXperimental Asymmetric Crypto Tool #
-Inexact is an experimental cryptographic tools, multi-platform, scriptable
-complying with the KISS principle (Keep it simple and stupid).
+Inexact is an experimental cryptographic tool, multi-platform, scriptable
+complying with the KISS principle (Keep It Simple and Stupid).
-The main features are as follow:
+The main features are as follows:
- Asymmetric encryption.
- Symmetric encryption.
@@ -13,9 +13,9 @@ The main features are as follow:
- Base64 or modified base64 encoding output compatible with a URL path, DNS entry, or file name.
-** WARNING : Inexact uses recent algorithms not approved nor by NIST or NSA ! **
+** WARNING : Inexact uses recent algorithms that are not approved by NIST or NSA ! **
-** Don't use for anything other than experiments. **
+** Don't use it for anything else than experiments. **
## Encryption principles
@@ -43,7 +43,7 @@ Rest of protocol:
- The nonce for the Norx function of the second part is a SHA3-256 hash of
parameters of the first part and rand1 buffer.
- Argon2 is used as a challenge for the password of the private key.
-- The symmetric encryption is based on ian asymmetric encryption by adding argon2
+- The symmetric encryption is based on the asymmetric encryption by adding argon2
challenge nonce and public key in the encrypted message.
Schematic: