As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.
This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today’s quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.
This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Chapter 1. Cryptography in the quantum computing era
Chapter 2. The journey to quantum protection
Chapter 3. Using quantum-safe cryptography
Chapter 4. Getting ready for quantum-safe cryptography
Chapter 5. Creating a cryptographic inventory
Chapter 6. Deploying quantum-safe capabilities
Appendix A. Finding cryptographic attributes
Appendix B. Generating quantum-safe keys
Appendix C. Translating plain text into cipher text
Appendix D. Generating and verifying digital signatures
Appendix E. Creating a hybrid quantum-safe key exchange
Appendix F. Generating a one-way hash