Transitioning to Quantum-Safe Cryptography on IBM Z Transitioning to Quantum-Safe Cryptography on IBM Z

Transitioning to Quantum-Safe Cryptography on IBM Z

Bill White and Others

Publisher Description

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

GENRE
Computers & Internet
RELEASED
2023
April 30
LANGUAGE
EN
English
LENGTH
190
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
1.8
MB

More Books Like This

Leveraging Integrated Cryptographic Service Facility Leveraging Integrated Cryptographic Service Facility
2018
Security without Obscurity Security without Obscurity
2018
Expert SQL Server 2008 Encryption Expert SQL Server 2008 Encryption
2011
Security without Obscurity Security without Obscurity
2021
Modern Cryptography for Cybersecurity Professionals Modern Cryptography for Cybersecurity Professionals
2021
RSA Security's Official Guide to Cryptography RSA Security's Official Guide to Cryptography
2001

More Books by Bill White, Didier Andre, Gregg Arquero, Ritu Bajaj, Joe Cronin, Anne Dames, Henrik Lyksborg, Alexandra Miranda & Maxwell Weiss

Uppity Uppity
2011
Intrepid Intrepid
2008
IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance
2010
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
2017
IBM z13 and IBM z13s Technical Introduction IBM z13 and IBM z13s Technical Introduction
2017
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 2 Standard Applications
2016

Customers Also Bought

Encryption Encryption
2016
Number Theory & RSA Cryptography Number Theory & RSA Cryptography
2018
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
The Quick Guide to Cloud Computing and Cyber Security The Quick Guide to Cloud Computing and Cyber Security
2013