As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. This means, organizations need to start protecting their sensitive data today with quantum-safe cryptography.
This IBM® Redbooks® publication looks at some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z® platform. This book also provides guidance on how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z quantum-safe capabilities.
This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.
Chapter 1. Cryptography in the quantum computing era
Chapter 2. The journey to quantum protection
Chapter 3. Using quantum-safe cryptography
Chapter 4. Getting ready for quantum-safe cryptography
Chapter 5. Creating a crypto inventory
Chapter 6. Deploying quantum-safe capabilities
Appendix A. Finding cryptographic attributes
Appendix B. Generating quantum-safe keys
Appendix C. Translating plain text into cipher text
Appendix D. Generating and verifying digital signatures
Appendix E. Creating a hybrid quantum-safe key exchange
Appendix F. Generating a one-way hash
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a client responsibility and depends upon the client's ability to evaluate and integrate them into the client's operational environment.