diff --git a/ccsrc/security/src/securty_services.cc b/ccsrc/security/src/securty_services.cc
index 5d7bb7f30194c223ccdd4ec71afff4103d149d8f..e6d0acb26e1c9df89753f8dcd706024483ee8eaf 100644
--- a/ccsrc/security/src/securty_services.cc
+++ b/ccsrc/security/src/securty_services.cc
@@ -135,7 +135,7 @@ int security_services::do_sign(const OCTETSTRING& p_encoded_message, const OCTET
   to64 = converter::get_instance().buffer_to_base64(std::vector(static_cast<const unsigned char*>(to_be_signed), to_be_signed.lengthof() + static_cast<const unsigned char*>(to_be_signed)));
   loggers::get_instance().log("security_services::do_sign: Data to be signed/verified: '%s'", converter::get_instance().bytes_to_string(to64).c_str());
 
-  // Retrive the private key
+  // Retrieve the private key
   const EVP_PKEY* private_key;
   int ret = _certs_db->get_private_key(certificate_id, &private_key);
   if (ret == 1) {
@@ -183,7 +183,7 @@ int security_services::do_sign(const OCTETSTRING& p_encoded_message, const OCTET
   ::EVP_MD_CTX_free(ctx);
 
   // // Ensure that the signature round-trips
-  // // Retrive the public key
+  // // Retrieve the public key
   // const EVP_PKEY* public_key;
   // if (_certs_db->get_private_key(certificate_id, &public_key) == 1) {
   //   loggers::get_instance().warning("security_services::do_sign: Failed to retrieve private key");
@@ -309,7 +309,7 @@ bool security_services::do_sign_verify(const CHARSTRING& p_message, const OCTETS
   }
   loggers::get_instance().log("security_services::do_sign_verify: certificate dump: '%s'", _certs_db->cert_to_string(certificate_id).c_str());
 
-  // Retrive the public key
+  // Retrieve the public key
   const EVP_PKEY* public_key;
   int ret = _certs_db->get_public_keys(certificate_id, &public_key);
   if (ret == 1) {