Skip to content

Commit bebe562

Browse files
Update 5-describe-encryption-hashing.md
1 parent a625d7c commit bebe562

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

learn-pr/wwl-sci/describe-security-concepts-methodologies/includes/5-describe-encryption-hashing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ Because the public key can be freely shared, asymmetric encryption solves the ke
2626

2727
Asymmetric encryption also enables *digital signatures*, which verify both the authenticity and integrity of data. When a sender signs data with their private key, anyone with the sender's public key can verify that:
2828

29-
1. The data came from the expected sender (authenticity).
30-
2. The data wasn't modified after it was signed (integrity).
29+
- The data came from the expected sender (authenticity).
30+
- The data wasn't modified after it was signed (integrity).
3131

3232
Digital signatures are used to verify software downloads, authenticate email messages, and secure electronic documents and transactions.
3333

0 commit comments

Comments
 (0)