Skip to content

Commit ed43069

Browse files
committed
Fix typo -- missing space
1 parent 7b0d06f commit ed43069

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

index.bs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Cryptography may be used to provide several basic security services: confidentia
7979

8080
## Confidentiality ## {#confidentiality}
8181
Confidentiality ensures that information is protected from being disclosed to unauthorized parties. It is typically achieved through encryption, which transforms readable data into an unreadable data using a cryptographic key. Only authorized parties that know the correct key can decrypt and access the original information.
82-
The most used cryptographic algorithms for ensuring confidentialityare [symmetric encryption](#symmetric-encryption) algorithms, such as AES (Advanced Encryption Standard).
82+
The most used cryptographic algorithms for ensuring confidentiality are [symmetric encryption](#symmetric-encryption) algorithms, such as AES (Advanced Encryption Standard).
8383

8484
## Integrity ## {#integrity}
8585
Integrity ensures that data remains unchanged and unaltered during transmission or storage. It is typically achieved through hashing algorithms. If the data is modified, the hash value will change, indicating that the integrity of the data has been compromised. Integrity is essential for ensuring that information remains accurate, preventing unauthorized modifications. The most used cryptographic algorithms for ensuring integrity are [hash functions](#hash-functions), such as SHA-256 (Secure Hash Algorithm 256-bit).

0 commit comments

Comments
 (0)