diff --git a/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.Designer.cs b/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.Designer.cs index 409ff411d3..dcfbd5fc59 100644 --- a/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.Designer.cs +++ b/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.Designer.cs @@ -125,9 +125,7 @@ internal static string DoNotUseWeakCryptographicAlgorithms { } /// - /// Looks up a localized string similar to Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered  messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. - /// - ///HOW: Replace encryption uses with the AES algorithm (AES-25 [rest of string was truncated]";. + /// Looks up a localized string similar to Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered  messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 [rest of string was truncated]";. /// internal static string DoNotUseWeakCryptographicAlgorithmsDescription { get { @@ -136,7 +134,7 @@ internal static string DoNotUseWeakCryptographicAlgorithmsDescription { } /// - /// Looks up a localized string similar to {0} uses an weak cryptographic algorithm {1}. + /// Looks up a localized string similar to {0} uses a weak cryptographic algorithm {1}. /// internal static string DoNotUseWeakCryptographicAlgorithmsMessage { get { diff --git a/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.resx b/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.resx index a02ecdccb6..c35f743393 100644 --- a/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.resx +++ b/src/FxCop/Desktop.Analyzers/Core/DesktopAnalyzersResources.resx @@ -139,11 +139,9 @@ Do Not Use Weak Cryptographic Algorithms - Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered  messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. - -HOW: Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA-2 512, SHA-2 384, or SHA-2 256. + Cryptographic algorithms degrade over time as attacks become for advances to attacker get access to more computation. Depending on the type and application of this cryptographic algorithm, further degradation of the cryptographic strength of it may allow attackers to read enciphered messages, tamper with enciphered  messages, forge digital signatures, tamper with hashed content, or otherwise compromise any cryptosystem based on this algorithm. Replace encryption uses with the AES algorithm (AES-256, AES-192 and AES-128 are acceptable) with a key length greater than or equal to 128 bits. Replace hashing uses with a hashing function in the SHA-2 family, such as SHA-2 512, SHA-2 384, or SHA-2 256. - {0} uses an weak cryptographic algorithm {1} + {0} uses a weak cryptographic algorithm {1} \ No newline at end of file