Skip to content

Commit

Permalink
fix: typo (#152)
Browse files Browse the repository at this point in the history
  • Loading branch information
stnmtz authored Oct 9, 2023
1 parent e8f96d6 commit 08147c0
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion _docs_explore/62-cryptography.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Key Exchange: ECDH X25519 (Elliptic Curve Diffie Hellman with Curve25519), 256bi

## Used Randomness

To reach enough entropy for safe private and secret keys, key generation is based on randomness, which is very important for modern cryptography. Applications rely on cryptographic libraries for randomness which in turn use software-based randomness (like timestamps, calculation durations and seeds) and hardware-supported randomness (like sensor input, hardware ids or even dedicated ranomness modules).
To reach enough entropy for safe private and secret keys, key generation is based on randomness, which is very important for modern cryptography. Applications rely on cryptographic libraries for randomness which in turn use software-based randomness (like timestamps, calculation durations and seeds) and hardware-supported randomness (like sensor input, hardware ids or even dedicated randomness modules).

Our randomness is based on the mentioned library [libsodium.js](https://github.com/jedisct1/libsodium.js) which is using the standard [WebCrypto APIs](https://developer.mozilla.org/en-US/docs/Web/API/Crypto/getRandomValues). With the WebCrypto API, the browser's randomness generator is used. The browser uses either an own implementation of a secure Pseudo-Random-Generator, or - in modern browsers - the operating system's random generator, which is usually taking hardware into consideration. Our solution is thus using the same mechanisms the browser use for securing Transport Layer Security (TLS) communication over the world wide web.

Expand Down

0 comments on commit 08147c0

Please sign in to comment.