diff options
author | John Bampton <jbampton@users.noreply.github.com> | 2024-05-01 06:54:05 +1000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-04-30 16:54:05 -0400 |
commit | f61885edcf5e63ac205b1ca5f08173f1336bff74 (patch) | |
tree | 2d577255ee2fd3c3c5743edf1c0184a67abcb7d2 /bip-0151.mediawiki | |
parent | 2d9e431fbe654640b55bca3bf8c4b17462890109 (diff) |
docs: fix spelling (#1117)
Co-authored-by: Mark "Murch" Erhardt <murch@murch.one>
Diffstat (limited to 'bip-0151.mediawiki')
-rw-r--r-- | bip-0151.mediawiki | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/bip-0151.mediawiki b/bip-0151.mediawiki index 793c244..8bc1197 100644 --- a/bip-0151.mediawiki +++ b/bip-0151.mediawiki @@ -85,7 +85,7 @@ a 64 bit nonce and a 64 bit counter into 64 bytes of output. This output is used Poly1305, also by Daniel Bernstein [4], is a one-time Carter-Wegman MAC that computes a 128 bit integrity tag given a message and a single-use 256 bit secret key. -The chacha20-poly1305@openssh.com specified and defined by openssh [5] combines these two primitives into an authenticated encryption mode. The construction used is based on that proposed for TLS by Adam Langley [6], but differs in the layout of data passed to the MAC and in the addition of encyption of the packet lengths. +The chacha20-poly1305@openssh.com specified and defined by openssh [5] combines these two primitives into an authenticated encryption mode. The construction used is based on that proposed for TLS by Adam Langley [6], but differs in the layout of data passed to the MAC and in the addition of encryption of the packet lengths. <code>K_1</code> must be used to only encrypt the payload size of the encrypted message to avoid leaking information by revealing the message size. |