From ed4d6674b13ef031379b5d53491a605388e47e3e Mon Sep 17 00:00:00 2001 From: Noratrieb <48135649+Noratrieb@users.noreply.github.com> Date: Wed, 21 Aug 2024 22:41:47 +0200 Subject: [PATCH] fuck --- content/posts/ssh-security/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/ssh-security/index.md b/content/posts/ssh-security/index.md index c8e2f2c..28fd3c3 100644 --- a/content/posts/ssh-security/index.md +++ b/content/posts/ssh-security/index.md @@ -171,7 +171,7 @@ A cipher can either be a block cipher or a stream cipher. A block cipher splits and then encrypts one block after the other. AES is a block cipher. You need a *mode of operation* for this, which describes how exactly the blocks are encrypted. -The most popular mode of operation of AES these days is Counter Mode (CTR) (or rather, it's better sibling Galois Counter Mode (GCM), which we will get to later). +The most popular mode of operation of AES these days is Counter Mode (CTR) (or rather, its better sibling Galois Counter Mode (GCM), which we will get to later). Counter mode doesn't actually encrypt the message in blocks, it just encrypts a number, the counter, for every block. The resulting ciphertext can then be used as the keystream for a *stream cipher*.