Skip to content

Commit 2b855d8

Browse files
fix wording
Co-authored-by: cpholguera <[email protected]>
1 parent ea075ea commit 2b855d8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

Document/0x04g-Testing-Cryptography.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ For more information on effective block modes, see the [NIST guidelines on block
143143

144144
CBC, OFB, CFB, PCBC, GCM mode require an initialization vector (IV) as an initial input to the cipher. The IV doesn't have to be kept secret, but it shouldn't be predictable: it should be random and unique/non-repeatable for each encrypted message. Make sure that IVs are generated using a cryptographically secure random number generator. For more information on IVs, see [Crypto Fail's initialization vectors article](http://www.cryptofails.com/post/70059609995/crypto-noobs-1-initialization-vectors "Crypto Noobs #1: Initialization Vectors").
145145

146-
Pay attention on cryptographic libraries used in code: many open source libraries provide examples in documentations that follow bad practices (i.e. using a hardcoded IV). A popular mistake is copy-pasting example code without changing IV value.
146+
Pay attention to cryptographic libraries used in the code: many open source libraries provide examples in their documentations that might follow bad practices (e.g. using a hardcoded IV). A popular mistake is copy-pasting example code without changing the IV value.
147147

148148
#### Initialization Vectors in stateful operation modes
149149

0 commit comments

Comments
 (0)