Transitioning to Quantum-Safe Cryptography on IBM Z Transitioning to Quantum-Safe Cryptography on IBM Z

Transitioning to Quantum-Safe Cryptography on IBM Z

Bill White and Others

Publisher Description

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

GENRE
Computing & Internet
RELEASED
2023
30 April
LANGUAGE
EN
English
LENGTH
190
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
1.8
MB
Security and Linux on z Systems Security and Linux on z Systems
2018
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
2019
Network Security with OpenSSL Network Security with OpenSSL
2002
Cryptography Engineering Cryptography Engineering
2011
Network Security Bible Network Security Bible
2011
Implementing SSL / TLS Using Cryptography and PKI Implementing SSL / TLS Using Cryptography and PKI
2011
IBM z15 Technical Introduction IBM z15 Technical Introduction
2021
IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment IBM Hyper Protect Platform: Applying Data Protection and Confidentiality in a Hybrid Cloud Environment
2024
Keeping Up With Security and Compliance on IBM Z Keeping Up With Security and Compliance on IBM Z
2023
IBM Z Functional Matrix IBM Z Functional Matrix
2024
Getting Started with z/OS Data Set Encryption Getting Started with z/OS Data Set Encryption
2021
IBM z15 Configuration Setup IBM z15 Configuration Setup
2020
Encryption Encryption
2016
Number Theory & RSA Cryptography Number Theory & RSA Cryptography
2018
The Quick Guide to Cloud Computing and Cyber Security The Quick Guide to Cloud Computing and Cyber Security
2013
The Swift Programming Language (Swift 5.7) The Swift Programming Language (Swift 5.7)
2014
The Adventures of Sherlock Holmes The Adventures of Sherlock Holmes
1892