diff --git a/models/Application_examples/Replay_Attack.mp b/models/Application_examples/Replay_Attack.mp
index 83a4913977d75efdfc9c862107171b447f2dd58b..73c06714fb3aa107a0f82aa4035d7d09464d6a4a 100644
--- a/models/Application_examples/Replay_Attack.mp
+++ b/models/Application_examples/Replay_Attack.mp
@@ -10,7 +10,7 @@
 │*│ │ To illustrate MP modeling of a replay attack       │ │
 │*│ │ involving data transmission.                       │ │
 │*│ └────────────────────────────────────────────────────┘ │
-│*│														   │
+│*│                                                        │
 │*│ ┌─[ Description ]────────────────────────────────────┐ │
 │*│ │ This model demonstrates a well known attack        │ │
 │*│ │ strategy on a communication system. Users may use  │ │