Commit c402d8dc authored by Benjamin Peterson's avatar Benjamin Peterson

shorten and fix casing of title

parent 6aa1564e
...@@ -176,8 +176,8 @@ A hash object has the following methods: ...@@ -176,8 +176,8 @@ A hash object has the following methods:
compute the digests of data sharing a common initial substring. compute the digests of data sharing a common initial substring.
Key Derivation Function Key derivation
----------------------- --------------
Key derivation and key stretching algorithms are designed for secure password Key derivation and key stretching algorithms are designed for secure password
hashing. Naive algorithms such as ``sha1(password)`` are not resistant against hashing. Naive algorithms such as ``sha1(password)`` are not resistant against
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment