Transitioning to Quantum-Safe Cryptography on IBM Z Transitioning to Quantum-Safe Cryptography on IBM Z

Transitioning to Quantum-Safe Cryptography on IBM Z

Bill White والمزيد

وصف الناشر

As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today's quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠٢٣
٣٠ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
١٩٠
الناشر
IBM Redbooks
البائع
International Business Machines Corp
الحجم
١٫٨
‫م.ب.‬
System z Crypto and TKE Update System z Crypto and TKE Update
٢٠١١
IBM System i Security: Protecting i5/OS Data with Encryption IBM System i Security: Protecting i5/OS Data with Encryption
٢٠٠٨
Official (ISC)2  Guide to the CISSP CBK Official (ISC)2  Guide to the CISSP CBK
٢٠١٢
Security and Linux on z Systems Security and Linux on z Systems
٢٠١٨
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
٢٠١٩
Security Guide for IBM i V6.1 Security Guide for IBM i V6.1
٢٠٠٩
Uppity Uppity
٢٠١١
Intrepid Intrepid
٢٠٠٨
IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance IBM z/OS V1R11 Communications Server TCP / IP Implementation Volume 3: High Availability, Scalability, and Performance
٢٠١٠
IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 4 Security and Policy-Based Networking
٢٠١٧
Getting Started with Linux on Z Encryption for Data At-Rest Getting Started with Linux on Z Encryption for Data At-Rest
٢٠١٩
IBM z13 and IBM z13s Technical Introduction IBM z13 and IBM z13s Technical Introduction
٢٠١٧
Encryption Encryption
٢٠١٦
Modern Cryptography Volume 1 Modern Cryptography Volume 1
٢٠٢٢
Number Theory & RSA Cryptography Number Theory & RSA Cryptography
٢٠١٨
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
٢٠٠٦
The Quick Guide to Cloud Computing and Cyber Security The Quick Guide to Cloud Computing and Cyber Security
٢٠١٣
The Swift Programming Language (Swift 5.7) The Swift Programming Language (Swift 5.7)
٢٠١٤