From 87b0bb7ab14776d402fe9f4e9479d16a79151802 Mon Sep 17 00:00:00 2001 From: Michael Savage Date: Tue, 21 Nov 2017 22:57:01 +0200 Subject: [PATCH] New lines after . --- doc/man/man3/intro.3monocypher | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/doc/man/man3/intro.3monocypher b/doc/man/man3/intro.3monocypher index d57e4f7..df4dc0e 100644 --- a/doc/man/man3/intro.3monocypher +++ b/doc/man/man3/intro.3monocypher @@ -178,12 +178,13 @@ If the target platform is something other than x86, x86_64, ARM or ARM64, double check how it handles multiplication. .Pp .Ss Data compression -Encryption does not hide the length of the input plaintext. Most -compression algorithms work by using fewer bytes to encode previously -seen data or common characters. If an attacker can add data to the input -before it is compressed and encrypted, they can observe changes to the -ciphertext length to recover secrets from the input, as demonstrated by -researchers in the CRIME attack against HTTPS. +Encryption does not hide the length of the input plaintext. +Most compression algorithms work by using fewer bytes to encode +previously seen data or common characters. +If an attacker can add data to the input before it is compressed and +encrypted, they can observe changes to the ciphertext length to recover +secrets from the input, as demonstrated by researchers in the CRIME +attack against HTTPS. .Ss Forward secrecy Long term secrets cannot be expected to stay safe indefinitely. Users may reveal them by mistake, or the host computer might have a -- 2.47.3