Skip to content

Commit 3156111

Browse files
Content update
1 parent 562e0ad commit 3156111

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

CBOM/en/0x20-Use-Cases.md

+1-2
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,7 @@ approach to inventorying cryptographic assets and evaluating their resilience ag
2525
cryptographic algorithms and their respective parameters, CBOM enables organizations to identify vulnerable or weak
2626
components that require mitigation or replacement with quantum-resistant alternatives recommended by NSA and NIST.
2727
Through comprehensive analysis and strategic planning facilitated by CBOM, organizations can proactively transition to
28-
post-quantum cryptographic primitives, ensuring the long-term security and integrity of their systems and applications
29-
in the face of evolving technological landscapes.
28+
post-quantum cryptographic primitives, ensuring the long-term security and integrity of their systems and applications.
3029

3130
## Cryptographic Requirements and Certifications
3231
CBOM facilitates the assessment of whether cryptographic implementations meet the stringent criteria outlined by

0 commit comments

Comments
 (0)