diff --git a/book/source/07-signing_data.md b/book/source/07-signing_data.md index b8ce38d..6a5458b 100644 --- a/book/source/07-signing_data.md +++ b/book/source/07-signing_data.md @@ -63,9 +63,9 @@ An inline-signed OpenPGP message consists of three segments: #### Creation -To produce an inline signature, the signer processes the entirety of the data by reading from an input file and writing into am output OpenPGP message file. As the data is processed, the signer simultaneously calculates a cryptographic signature. This procedure results in a data signature packet being appended to the output OpenPGP message file, an essential step for efficient signing. +To produce an inline signature, the signer processes the entirety of the data by reading from an input file and writing into an output OpenPGP message file. As the data is processed, the signer simultaneously calculates a cryptographic signature. This procedure results in a data signature packet being appended to the output OpenPGP message file, where it can be efficiently stored. -For efficient verification, an application must understand how to handle the literal data prior to its reading. This requirement is addressed by the One-Pass Signature packets located at the beginning of inline-signed messages. These packets include essential information such as the fingerprint of the signing key and the hash algorithm used for computing the signature's hash digest. This setup enables the verifier to process the data correctly and efficiently. +For efficient verification, an application must understand how to handle the literal data prior to its reading. This requirement is addressed by the one-pass signature packets located at the beginning of inline-signed messages. These packets include essential information such as the fingerprint of the signing key and the hash algorithm used for computing the signature's hash digest. This setup enables the verifier to process the data correctly and efficiently. ```{admonition} TODO :class: warning @@ -77,9 +77,9 @@ Is the signer keyid/fingerprint in the OPS important for the verifier to be able Inline-signed messages enable efficient verification in *one pass*, structured as follows: -1. **Initiation with One-Pass Signature packets**: These packets begin the verification process. They include the signer's key ID/fingerprint, essential for identifying the appropriate public key for signature validation. +1. **Initiation with one-pass signature packets**: These packets begin the verification process. They include the signer's key ID/fingerprint, essential for identifying the appropriate public key for signature validation. -2. **Processing the literal data**: This step involves hashing the literal data, preparing it for signature verification. +2. **Processing the literal data packet**: This step involves hashing the literal data, preparing it for signature verification. 3. **Verifying signature packets**: Located at the end of the message, these packets are checked against the previously calculated hash digest.