@@ -402,9 +402,9 @@ slower than secret-key ciphers. Consequently, secret-key ciphers are
402402used for the vast majority of encryption, while public-key ciphers are
403403reserved for use in authentication and session key establishment.
404404
405- .. admonition :: Post-Quantum Cryptography
405+ .. sidebar :: Post-Quantum Cryptography
406406
407- As we have seen, a lot of cryptography depends on the difficulty of
407+ * As we have seen, a lot of cryptography depends on the difficulty of
408408 solving certain mathematical problems, such as factoring prime
409409 numbers or computing discrete logarithms. When the efforts of
410410 mathematicians over decades to solve a problem have proven
@@ -417,9 +417,9 @@ reserved for use in authentication and session key establishment.
417417 progress is made towards ever larger quantum computers, measured by
418418 the number of quantum bits (qubits), there is a real
419419 risk that many current cryptographic algorithms will at some point
420- become breakable.
420+ become breakable. *
421421
422- There is plenty of debate about whether quantum computing will ever
422+ * There is plenty of debate about whether quantum computing will ever
423423 progress to the point that the risks to conventional cryptography
424424 materialize. Current quantum computers are much too small and lack
425425 the error-correcting capabilities necessary to solve the
@@ -434,23 +434,23 @@ reserved for use in authentication and session key establishment.
434434 considering the possibility that some data that is well protected
435435 today could be stored for a decade or two and then decrypted by a
436436 future quantum computer, so even data produced today could be at
437- risk.
437+ risk.*
438438
439- The response to this uncertain threat has been to develop suites of
439+ * The response to this uncertain threat has been to develop suites of
440440 cryptographic algorithms for which no quantum solution is
441441 known. This is the field of "Post-Quantum Cryptography". Note the
442442 use of the phrase "no solution is known". It is hard to prove that
443443 no algorithm exists—once again we are in the territory of trying to
444444 prove a negative. But NIST is running a process to evaluate and
445445 standardize a set of quantum-resistant algorithms, and there is
446446 plenty of focus on the candidate algorithms to establish their
447- suitability over the long term.
447+ suitability over the long term. *
448448
449- There is a general, if not universal, sense that at some point
449+ * There is a general, if not universal, sense that at some point
450450 post-quantum cryptographic algorithms will be needed. While the
451451 timeframe is uncertain and the exact algorithms to be used may
452452 change, the requirement for *crypto-agility *—the ability to swap
453- out one set of algorithms for another—is now well established.
453+ out one set of algorithms for another—is now well established.*
454454
4554553.4 Message Authentication
456456---------------------------------
0 commit comments