Skip to content

Commit 445d4da

Browse files
committed
Updated confidentiality
1 parent 3a9853f commit 445d4da

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

index.bs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,9 @@ Cryptography provides several fundamental security services, including confident
7979

8080
## Confidentiality ## {#confidentiality}
8181

82-
**Confidentiality** in cryptography aims to ensure that information is kept secret from unauthorized parties—only the intended recipient(s) can access and understand the message, while anyone else—even if they intercept it—cannot make sense of it. This is typically achieved through **encryption**, which converts readable data (**plaintext**) into **ciphertext** that can only be decrypted by authorized parties with the correct cryptographic key; a widely used example is the **Advanced Encryption Standard (AES)**, standardized by the U.S. National Institute of Standards and Technology ([NIST FIPS 197](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf)).
82+
**Confidentiality** in cryptography aims to ensure that information is kept secret from unauthorized parties—only the intended recipient(s) can access and understand the message, while anyone else—even if they intercept it—cannot make sense of it. This is typically achieved through **encryption**, which converts readable data (**plaintext**) into **ciphertext** that can only be decrypted by authorized parties with the correct cryptographic key; a widely used example is the **Advanced Encryption Standard (AES)**, standardized by the U.S. National Institute of Standards and Technology [[FIPS-197]].
8383

84-
Maintaining confidentiality also requires proper key management and access control. Secure key management ensures that cryptographic keys are safely generated, stored, and distributed, while access control mechanisms restrict information to only those with permission, preventing unauthorized use or disclosure (see Section 4.2 for more details on key management).
84+
Maintaining confidentiality also requires proper key management and access control. Secure key management ensures that cryptographic keys are safely generated, stored, and distributed, while access control mechanisms restrict information to only those with permission, preventing unauthorized use or disclosure (see [Section 4.2] (#key-management) for more details on key management).
8585

8686

8787
## Integrity ## {#integrity}

0 commit comments

Comments
 (0)