From 3d02f4ae8842e99f4b24eefeb1b934c06ed9e220 Mon Sep 17 00:00:00 2001 From: Heiko Schaefer Date: Fri, 17 Nov 2023 13:34:18 +0100 Subject: [PATCH] Fix swapped description (From #112) --- book/source/03-cryptography.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/book/source/03-cryptography.md b/book/source/03-cryptography.md index ebfd687..bb7ad6c 100644 --- a/book/source/03-cryptography.md +++ b/book/source/03-cryptography.md @@ -82,7 +82,7 @@ By addressing the malleability problem, AEAD also counters a variation of the EF [Public-key cryptography](https://en.wikipedia.org/wiki/Public-key_cryptography) uses asymmetric pairs of related keys. Each pair consists of a public key and a private key. These systems support encryption, decryption, and digital signature operations. -Unlike symmetric cryptography, participants are not required to pre-arrange a shared secret. In public-key cryptography, the public key material is shared openly for certain cryptographic operations, such as encryption and signature creation, while the private key, kept confidential, is used for operations like decryption and signature verification. +Unlike symmetric cryptography, participants are not required to pre-arrange a shared secret. In public-key cryptography, the public key material is shared openly for certain cryptographic operations, such as encryption and signature verification, while the private key, kept confidential, is used for operations like decryption and signature creation. (asymmetric_key_pair)= ### Asymmetric cryptographic key pairs