diff --git a/draft-ietf-suit-firmware-encryption.md b/draft-ietf-suit-firmware-encryption.md
index 39391c3..c998f75 100644
--- a/draft-ietf-suit-firmware-encryption.md
+++ b/draft-ietf-suit-firmware-encryption.md
@@ -1486,35 +1486,11 @@ two methods are utilized, namely AES Key Wrap (AES-KW) and Ephemeral-Static
Diffie-Hellman (ES-DH). In this table we summarize the main properties with
respect to their deployment:
-~~~
-+---------------++------------+---------------+----------------+
-| || | | |
-| Number of || Same key | One key | One Key |
-| Long-Term || for all | per device | per device |
-| Keys || devices | | |
-| || | | |
-+---------------++------------+---------------+----------------+
-| || | | |
-| Number of || Single | Single | One CEK |
-| Content || CEK per | CEK per | per payload |
-| Encryption || payload | payload | encryption |
-| Keys (CEKs) || shared | shared | transaction |
-| || with all | with all | per device |
-| || devies | devies | |
-| || | | |
-+---------------++------------+---------------+----------------+
-| || | | |
-| Use Case || Legacy | Efficient | Point-to- |
-| || Usage | Payload | Point Payload |
-| || | Distribution | Distribution |
-| || | | |
-+---------------++------------+---------------+----------------+
-| || | | |
-| Recommended? || No, bad | Yes | Yes |
-| || practice | | |
-| || | | |
-+---------------++------------+---------------+----------------+
-~~~
+| Number of
Long-Term
Keys | Number of
Content
Encryption
Keys (CEKs) | Use Case | Recommended? |
+|----------------------------------|-----------------------------------------------------------------------|----------------------------------------------|----------------------|
+| Same key
for all
devices | Single
CEK per
payload
shared
with all
devies | Legacy
Usage | No, bad
practice |
+| One key
per device | Single
CEK per
payload
shared
with all
devies | Efficient
Payload
Distribution | Yes |
+| One Key
per device | One CEK
per payload
encryption
transaction
per device | Point-to-
Point Payload
Distribution | Yes |
The use of firmware encryption with IoT devices introduces an battery
exhaustion attack. This attack utilizes the fact that flash memory