Transitioning to Quantum-Safe Cryptography on IBM Z Transitioning to Quantum-Safe Cryptography on IBM Z

Transitioning to Quantum-Safe Cryptography on IBM Z

Bill White その他

発行者による作品情報

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

ジャンル
コンピュータ/インターネット
発売日
2023年
4月30日
言語
EN
英語
ページ数
190
ページ
発行者
IBM Redbooks
販売元
International Business Machines Corp
サイズ
1.8
MB
Security and Linux on z Systems Security and Linux on z Systems
2018年
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019年
Official (ISC)2 Guide to the ISSAP CBK, Second Edition Official (ISC)2 Guide to the ISSAP CBK, Second Edition
2013年
Cryptography Engineering Cryptography Engineering
2011年
Network Security Bible Network Security Bible
2011年
Official (ISC)2 Guide to the CSSLP CBK, Second Edition Official (ISC)2 Guide to the CSSLP CBK, Second Edition
2013年
IBM z13 and IBM z13s Technical Introduction IBM z13 and IBM z13s Technical Introduction
2017年
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017年
IBM z15 Technical Introduction IBM z15 Technical Introduction
2021年
IBM z Systems Connectivity Handbook SG24-5444 IBM z Systems Connectivity Handbook SG24-5444
2017年
IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing IBM z/OS V2R2 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing
2016年
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
2016年
Encryption Encryption
2016年
Number Theory & RSA Cryptography Number Theory & RSA Cryptography
2018年
The Swift Programming Language (Swift 5.7) The Swift Programming Language (Swift 5.7)
2014年
The Adventures of Sherlock Holmes The Adventures of Sherlock Holmes
1892年