Skip to content

Commit ba6fd39

Browse files
Merge pull request #12 from Frosne/confident
SHA: 88aa4e0 Reason: push, by verocri Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
1 parent 37893f1 commit ba6fd39

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

index.html

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
<meta content="Bikeshed version ac6b08744, updated Wed Dec 10 23:44:49 2025 +0000" name="generator">
99
<link href="https://w3c.github.io/security-guidelines-cryptography" rel="canonical">
1010
<link href="https://www.w3.org/2008/site/images/favicon.ico" rel="icon">
11-
<meta content="279354a33307d786d667aa8fa860a2889881c466" name="revision">
11+
<meta content="88aa4e0822d4131257f555ab1fc217be2a5b4cbe" name="revision">
1212
<meta content="dark light" name="color-scheme">
1313
<link href="https://www.w3.org/StyleSheets/TR/2021/dark.css" media="(prefers-color-scheme: dark)" rel="stylesheet" type="text/css">
1414
<style>/* Boilerplate: style-autolinks */
@@ -417,7 +417,7 @@
417417
</p>
418418
<h1 class="no-ref p-name" id="title">Cryptography usage in Web Standards</h1>
419419
<p id="w3c-state"><a href="https://www.w3.org/standards/types/#ED">Editor’s Draft</a>,
420-
<time class="dt-updated" datetime="2025-12-11">11 December 2025</time></p>
420+
<time class="dt-updated" datetime="2025-12-12">12 December 2025</time></p>
421421
<details open>
422422
<summary>More details about this document</summary>
423423
<div data-fill-with="spec-metadata">
@@ -527,6 +527,7 @@ <h2 class="no-num no-ref no-toc" id="contents">Table of Contents</h2>
527527
<li>
528528
<a href="#references"><span class="secno"></span> <span class="content">References</span></a>
529529
<ol class="toc">
530+
<li><a href="#normative"><span class="secno"></span> <span class="content">Normative References</span></a>
530531
<li><a href="#informative"><span class="secno"></span> <span class="content">Informative References</span></a>
531532
</ol>
532533
</ol>
@@ -584,11 +585,8 @@ <h2 class="heading settled" data-level="3" id="security-services"><span class="s
584585

585586

586587
<h3 class="heading settled" data-level="3.1" id="confidentiality"><span class="secno">3.1. </span><span class="content">Confidentiality</span><a class="self-link" href="#confidentiality"></a></h3>
587-
588-
Confidentiality ensures that information is protected from being disclosed to unauthorized parties. It is typically achieved through encryption, which transforms readable data into an unreadable data using a cryptographic key. Only authorized parties that know the correct key can decrypt and access the original information.
589-
The most used cryptographic algorithms for ensuring confidentiality are <a href="#symmetric-encryption">symmetric encryption</a> algorithms, such as AES (Advanced Encryption Standard).
590-
591-
588+
<p><strong>Confidentiality</strong> in cryptography aims to ensure that information is kept secret from unauthorized parties—only the intended recipient(s) can access and understand the message, while anyone else—even if they intercept it—cannot make sense of it. This is typically achieved through <strong>encryption</strong> — covered in Sections <a href="#asymmetric-encryption">7.1</a> and <a href="#symmetric-encryption">7.2</a> — which converts readable data (<strong>plaintext</strong>) into <strong>ciphertext</strong> that can only be decrypted by authorized parties with the correct cryptographic key; a widely used example is the <strong>Advanced Encryption Standard (AES)</strong>, standardized by the U.S. National Institute of Standards and Technology <a data-link-type="biblio" href="#biblio-fips-197" title="Advanced Encryption Standard (AES)">[FIPS-197]</a>.</p>
589+
<p>Maintaining confidentiality also requires proper key management and access control. Secure key management ensures that cryptographic keys are safely generated, stored, and distributed, while access control mechanisms restrict information to only those with permission, preventing unauthorized use or disclosure (see <a href="#key-management">Section 4.2</a> for more details on key management).</p>
592590
<h3 class="heading settled" data-level="3.2" id="integrity"><span class="secno">3.2. </span><span class="content">Integrity</span><a class="self-link" href="#integrity"></a></h3>
593591

594592
Integrity ensures that data remains unchanged and unaltered during transmission or storage. It is typically achieved through hashing algorithms. If the data is modified, the hash value will change, indicating that the integrity of the data has been compromised. Integrity is essential for ensuring that information remains accurate, preventing unauthorized modifications. The most used cryptographic algorithms for ensuring integrity are <a href="#hash-functions">hash functions</a>, such as SHA-256 (Secure Hash Algorithm 256-bit).
@@ -820,6 +818,11 @@ <h2 class="heading settled" data-level="8" id="acknowledgment"><span class="secn
820818
</main>
821819
<script src="https://www.w3.org/scripts/TR/2021/fixup.js"></script>
822820
<h2 class="heading no-num no-ref settled" id="references"><span class="content">References</span><a class="self-link" href="#references"></a></h2>
821+
<h3 class="heading no-num no-ref settled" id="normative"><span class="content">Normative References</span><a class="self-link" href="#normative"></a></h3>
822+
<dl>
823+
<dt id="biblio-fips-197">[FIPS-197]
824+
<dd>National Institute of Standards and Technology. <a href="https://csrc.nist.gov/publications/detail/fips/197/final"><cite>Advanced Encryption Standard (AES)</cite></a>. URL: <a href="https://csrc.nist.gov/publications/detail/fips/197/final">https://csrc.nist.gov/publications/detail/fips/197/final</a>
825+
</dl>
823826
<h3 class="heading no-num no-ref settled" id="informative"><span class="content">Informative References</span><a class="self-link" href="#informative"></a></h3>
824827
<dl>
825828
<dt id="biblio-a-hrc-53-42">[A-HRC-53-42]
@@ -828,8 +831,6 @@ <h3 class="heading no-num no-ref settled" id="informative"><span class="content"
828831
<dd>National Institute of Standards and Technology. <a href="https://csrc.nist.gov/publications/detail/fips/180/4/final"><cite>Secure Hash Standard (SHS)</cite></a>. URL: <a href="https://csrc.nist.gov/publications/detail/fips/180/4/final">https://csrc.nist.gov/publications/detail/fips/180/4/final</a>
829832
<dt id="biblio-fips-186-5">[FIPS-186-5]
830833
<dd>National Institute of Standards and Technology. <a href="https://csrc.nist.gov/pubs/fips/186-5/final"><cite>Digital Signature Standard (DSS)</cite></a>. URL: <a href="https://csrc.nist.gov/pubs/fips/186-5/final">https://csrc.nist.gov/pubs/fips/186-5/final</a>
831-
<dt id="biblio-fips-197">[FIPS-197]
832-
<dd>National Institute of Standards and Technology. <a href="https://csrc.nist.gov/publications/detail/fips/197/final"><cite>Advanced Encryption Standard (AES)</cite></a>. URL: <a href="https://csrc.nist.gov/publications/detail/fips/197/final">https://csrc.nist.gov/publications/detail/fips/197/final</a>
833834
<dt id="biblio-fips-198-1">[FIPS-198-1]
834835
<dd>National Institute of Standards and Technology. <a href="https://csrc.nist.gov/publications/detail/fips/198/1/final"><cite>The Keyed-Hash Message Authentication Code (HMAC)</cite></a>. URL: <a href="https://csrc.nist.gov/publications/detail/fips/198/1/final">https://csrc.nist.gov/publications/detail/fips/198/1/final</a>
835836
<dt id="biblio-fips-202">[FIPS-202]

0 commit comments

Comments
 (0)