commit 2f63beb628c1e8dc050041820073036ce78d54c2
parent 3dfa8248c0b4c714e6c10041f00cb6c651a7eace
Author: Jared Tobin <jared@jtobin.io>
Date: Fri, 28 Jul 2023 16:23:46 -0230
Fix typo.
Diffstat:
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/s3.md b/docs/s3.md
@@ -5,7 +5,7 @@
This one took me some fiddling to get right. As stated in the challenge
text itself, it's easy to get hung up on the idea of decrypting padding
bytes themselves. But the idea is to choose ciphertext byte values so as
-to *force* valid padding in a "phantom" plaintext, then using the added
+to *force* valid padding in a "phantom" plaintext, then use the added
information to recover the actual plaintext bytes (padding bytes or no).
From the 2.16 answer text, CBC-mode decryption proceeds as follows: