0%

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Table of Contents

  1. Front cover
  2. Notices
  3. Preface
  4. Chapter 1. Cryptography in the quantum computing era
  5. Chapter 2. The journey to quantum protection
  6. Chapter 3. Using quantum-safe cryptography
  7. Chapter 4. Getting ready for quantum-safe cryptography
  8. Chapter 5. Creating a cryptographic inventory
  9. Chapter 6. Deploying quantum-safe capabilities
  10. Appendix A. Finding cryptographic attributes
  11. Appendix B. Generating quantum-safe keys
  12. Appendix C. Translating plain text into cipher text
  13. Appendix D. Generating and verifying digital signatures
  14. Appendix E. Creating a hybrid quantum-safe key exchange
  15. Appendix F. Generating a one-way hash
  16. Back cover