Skip to content

Commit be2b358

Browse files
committed
added references to encryption
1 parent 373a10a commit be2b358

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

index.bs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Cryptography provides several fundamental security services, including confident
7979

8080
## Confidentiality ## {#confidentiality}
8181

82-
**Confidentiality** in cryptography aims to ensure that information is kept secret from unauthorized parties—only the intended recipient(s) can access and understand the message, while anyone else—even if they intercept it—cannot make sense of it. This is typically achieved through **encryption**, which converts readable data (**plaintext**) into **ciphertext** that can only be decrypted by authorized parties with the correct cryptographic key; a widely used example is the **Advanced Encryption Standard (AES)**, standardized by the U.S. National Institute of Standards and Technology [[FIPS-197]].
82+
**Confidentiality** in cryptography aims to ensure that information is kept secret from unauthorized parties—only the intended recipient(s) can access and understand the message, while anyone else—even if they intercept it—cannot make sense of it. This is typically achieved through **encryption** — covered in Sections [7.1](#asymmetric-encryption) and [7.2](#symmetric-encryption) — which converts readable data (**plaintext**) into **ciphertext** that can only be decrypted by authorized parties with the correct cryptographic key; a widely used example is the **Advanced Encryption Standard (AES)**, standardized by the U.S. National Institute of Standards and Technology [[!FIPS-197]].
8383

8484
Maintaining confidentiality also requires proper key management and access control. Secure key management ensures that cryptographic keys are safely generated, stored, and distributed, while access control mechanisms restrict information to only those with permission, preventing unauthorized use or disclosure (see [Section 4.2](#key-management) for more details on key management).
8585

0 commit comments

Comments
 (0)