|
@@ -2146,7 +2146,7 @@ It is highly recommended that you \textbf{not} use the MD4 or MD5 hashes for the
|
|
|
These hashes are provided for completeness and they still can be used for the purposes of password hashing or one-way accumulators
|
|
|
(e.g. Yarrow).
|
|
|
|
|
|
-The other hashes such as the SHA-1, SHA-2 (that includes SHA-512, SHA-512/384, SHA-384, SHA-512/256, SHA-256 and SHA-224) and TIGER-192 are still considered secure
|
|
|
+The other hashes such as the SHA-2 (that includes SHA-512, SHA-512/384, SHA-384, SHA-512/256, SHA-256 and SHA-224) and TIGER-192 are still considered secure
|
|
|
for all purposes you would normally use a hash for.
|
|
|
|
|
|
\chapter{Message Authentication Codes}
|