diff options
author | Paul Duncan <pabs@pablotron.org> | 2021-11-13 02:27:08 -0500 |
---|---|---|
committer | Paul Duncan <pabs@pablotron.org> | 2021-11-13 02:27:08 -0500 |
commit | 34a56b93819dd6080ef7c0fcdf3baa67884fca62 (patch) | |
tree | f5dee5cdcd44c8cbd49c4b5b87e0641268b18e09 | |
parent | c6fca37a5a4f34074d5e1186bbbf046cf4ee9568 (diff) | |
download | pablotron.org-34a56b93819dd6080ef7c0fcdf3baa67884fca62.tar.bz2 pablotron.org-34a56b93819dd6080ef7c0fcdf3baa67884fca62.zip |
content/posts/2021-11-11-the-birthday-paradox.md: less verbosity
-rw-r--r-- | content/posts/2021-11-11-the-birthday-paradox.md | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/content/posts/2021-11-11-the-birthday-paradox.md b/content/posts/2021-11-11-the-birthday-paradox.md index 0b6c1af..37e1730 100644 --- a/content/posts/2021-11-11-the-birthday-paradox.md +++ b/content/posts/2021-11-11-the-birthday-paradox.md @@ -8,13 +8,12 @@ draft: true > is a shared birthday is greater than 50%? This is called the [Birthday Problem][bp], and the solution is known as -the *birthday paradox*. It is an interesting problem because the answer -is counterintuitive (hence the name *birthday paradox*) and because the -ramifications affect security, particularly [cryptographic hash -algorithms][hash]. +the *birthday paradox*. It is interesting because the answer is +counterintuitive and the ramifications affect the security of +[cryptographic hash algorithms][hash]. -The explanation was a bit long for a blog post, so I moved it -to a full article which you can read at the following URL: +The explanation is a bit long for a blog post, so I wrote a full +article: [The Birthday Paradox][bp] |