summaryrefslogtreecommitdiff
path: root/templates
diff options
context:
space:
mode:
Diffstat (limited to 'templates')
-rw-r--r--templates/index.html4
-rw-r--r--templates/key-commitment.html4
-rw-r--r--templates/mac-truncation.html2
3 files changed, 5 insertions, 5 deletions
diff --git a/templates/index.html b/templates/index.html
index 89ae0e1..c6d978d 100644
--- a/templates/index.html
+++ b/templates/index.html
@@ -38,7 +38,7 @@
<strong><a href="/forbidden-salamanders/key-commitment">Key commitment</a>.</strong> One of
our agents has infiltrated Roseacrucis&rsquo; inner circle, but all
secret keys are required to be surrendered to the
- counterintelligence authority. Help her send ciphertexts back to
+ counterintelligence authority. Help her send AES-GCM ciphertexts back to
the Library that decrypt to confidential information under one key,
but innocuous banter under another.
</p>
@@ -51,7 +51,7 @@
<p>
<strong><a href="/forbidden-salamanders/mac-truncation">MAC
truncation</a>.</strong> The sorcerer aims to conserve
- bandwidth by truncating MACs. Use the enemy as a decryption
+ bandwidth by truncating AES-GCM MACs. Use the enemy as a decryption
oracle to once again, recover the authentication key and forge
arbitrary ciphertext.
</p>
diff --git a/templates/key-commitment.html b/templates/key-commitment.html
index 026d6ae..a2b1b33 100644
--- a/templates/key-commitment.html
+++ b/templates/key-commitment.html
@@ -29,7 +29,7 @@
<strong>Key commitment.</strong> One of
our agents has infiltrated Roseacrucis&rsquo; inner circle, but all
secret keys are required to be surrendered to the
- counterintelligence authority. Help her send ciphertexts back to
+ counterintelligence authority. Help her send AES-GCM ciphertexts back to
the Library that decrypt to confidential information under one key,
but innocuous banter under another.
</p>
@@ -74,7 +74,7 @@
<br><div><em>
The agent now computes two keys, a nonce and constructs a single
- ciphertext. When decrypted under the first key, it will look
+ AES-GCM ciphertext. When decrypted under the first key, it will look
identical to the JPEG file; when decrypted under the second
key, it will look identical to the BMP file.
</em></div>
diff --git a/templates/mac-truncation.html b/templates/mac-truncation.html
index 7dfb906..24d4889 100644
--- a/templates/mac-truncation.html
+++ b/templates/mac-truncation.html
@@ -27,7 +27,7 @@
</div>
<p>
<strong>MAC truncation.</strong> The sorcerer aims to conserve
- bandwidth by truncating MACs. Use the enemy as a decryption
+ bandwidth by truncating AES-GCM MACs. Use the enemy as a decryption
oracle to once again, recover the authentication key and forge
arbitrary ciphertext.
</p>