Skip to content

Commit 390d676

Browse files
committed
Merge branch 'master' of github.com:SystemsApproach/security
2 parents edad775 + 9cf68a9 commit 390d676

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

crypto.rst

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -429,12 +429,12 @@ reserved for use in authentication and session key establishment.
429429
the error-correcting capabilities necessary to solve the
430430
mathematical problems at sufficient scale, and it is not guaranteed
431431
that some version of Moore's law will apply to quantum
432-
computing. Building quantum computers that are large enough (in
433-
number of qubits) and sufficiently fault-tolerant to actually
432+
computing. Building quantum computers that have a sufficient number
433+
of qubits and are sufficiently fault-tolerant to actually
434434
present a threat to cryptography remains an engineering
435435
challenge. That said, the risk is viewed as being sufficiently
436436
large that steps need to be taken to prepare for the day when
437-
quantum computers *can* break most existing algorithms. It is worth
437+
quantum computers can break most existing algorithms. It is worth
438438
considering the possibility that some data that is well protected
439439
today could be stored for a decade or two and then decrypted by a
440440
future quantum computer, so even data produced today could be at
@@ -453,7 +453,7 @@ reserved for use in authentication and session key establishment.
453453
*There is a general, if not universal, sense that at some point
454454
post-quantum cryptographic algorithms will be needed. While the
455455
timeframe is uncertain and the exact algorithms to be used may
456-
change, the requirement for *crypto-agility*—the ability to swap
456+
change, the requirement for crypto-agility—the ability to swap
457457
out one set of algorithms for another—is now well established.*
458458

459459
3.4 Message Authentication

infra.rst

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -367,7 +367,10 @@ willing to accept. Note the contrast to prior uses of certificates we
367367
have seen: a router builds a complete picture of the certificate
368368
hierarchy *a priori* in readiness for subsequent routing decisions,
369369
rather than checking the validity of certificates as part of
370-
establishing a session (as happens in TLS, for example).
370+
establishing a session (as happens in TLS, for example). The
371+
repositories now become an essential part of our routing
372+
infrastructure and must themselves be secured and protected against
373+
DoS attacks.
371374

372375
There is a well-established set of software tools to automate the
373376
process of leveraging the RPKI for popular operating systems and

0 commit comments

Comments
 (0)