@@ -429,12 +429,12 @@ reserved for use in authentication and session key establishment.
429429 the error-correcting capabilities necessary to solve the
430430 mathematical problems at sufficient scale, and it is not guaranteed
431431 that some version of Moore's law will apply to quantum
432- computing. Building quantum computers that are large enough (in
433- number of qubits) and sufficiently fault-tolerant to actually
432+ computing. Building quantum computers that have a sufficient number
433+ of qubits and are sufficiently fault-tolerant to actually
434434 present a threat to cryptography remains an engineering
435435 challenge. That said, the risk is viewed as being sufficiently
436436 large that steps need to be taken to prepare for the day when
437- quantum computers * can * break most existing algorithms. It is worth
437+ quantum computers can break most existing algorithms. It is worth
438438 considering the possibility that some data that is well protected
439439 today could be stored for a decade or two and then decrypted by a
440440 future quantum computer, so even data produced today could be at
@@ -453,7 +453,7 @@ reserved for use in authentication and session key establishment.
453453 *There is a general, if not universal, sense that at some point
454454 post-quantum cryptographic algorithms will be needed. While the
455455 timeframe is uncertain and the exact algorithms to be used may
456- change, the requirement for * crypto-agility * —the ability to swap
456+ change, the requirement for crypto-agility—the ability to swap
457457 out one set of algorithms for another—is now well established. *
458458
4594593.4 Message Authentication
0 commit comments