Enabling Quantum-Safe Cryptography

Quantum technology is an emerging field of physics and engineering and is a class of technology that works by using the principles of quantum mechanics, which is the physics of sub-atomic particles, including quantum entanglement and quantum superposition. Quantum technology is rapidly advancing and now IBM has announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. 

IBM's guidance is designed to help organisations prepare for the potential threat posed by quantum computers, which could render current encryption methods obsolete. This recognises that Quantum systems are on a path to solve previously unsolved problems beneficial to business and science, but this progress also poses security risks. 

As quantum computers continue to advance, they will reach the ability to break the most widely used security protocols in the world. What IBM calls Quantum Safe technology is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers. “By decade’s end, practical quantum computing solutions could impact computing strategies across industries. But it will also profoundly alter how we secure our digital data fabric through cryptography. Organisations are already examining how to upgrade their cyber security to prepare for this new computational era,” says IBM.

IBM's Quantum Safe Roadmap is designed to help government agencies and business meet the requirements and the deadlines for quantum safe cryptography and defines an end-to-end solution.

The roadmap details five stages of preparation for quantum-safe cryptography, starting with educating stakeholders about the need for quantum-safe cryptography and identifying sensitive data that may require quantum-safe protection.  “This roadmap serves as a commitment to transparency, predictability, and confidence as we guide industries along their journey to post-quantum cryptography... There’s a lot happening at once, new algorithms, standards, best practices, and guidance from federal agencies. We hope that this roadmap will serve as a navigational tool through this complex landscape,” according to IBM. 

The roadmap includes recommendations for implementing quantum-resistant encryption protocols and testing their effectiveness, as well as monitoring the security landscape for emerging quantum threats.

IBM Quantum Safe technology is designed to help clients prepare for the post-quantum era via: 

  •  IBM Quantum Safe Explorer  - to enable organisations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities and to build a Crypto-graphy Bill of Materials. This allows teams to view and aggregate potential risks into one central location.
  • IBM Quantum Safe Advisor - allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation and analyzes cryptographic posture and compliance to prioritize risks.
  • IBM Quantum Safe Remediator - enables organisations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

Analysts are predicting that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto-currencies, and communications systems vulnerable to significant cyber security threats. On this basis, organisations, technology providers and Internet standards will soon be required to transition to quantum-safe encryption. 

According to IBM, the transition to quantum-safe crypto-graphy will take time, but organisations can begin preparing now by evaluating their current encryption methods and infrastructure. 

  • NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world implementations while the US National Institute of Standards and Technology (NIST) has launched a competition to identify quantum-safe encryption algorithms. 
  • The US National Security Agency (NSA) has announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House released requirements for federal agencies to submit a crypto-graphic inventory of systems that could be vulnerable to cryptographically relevant quantum computers.

As quantum computing technology advances, it will become increasingly important for organisations to adopt quantum-safe encryption methods to protect sensitive data and maintain the security of their systems. IBM's Quantum Safe Roadmap and technology will expose organisations to their existing crypto-graphic landscape so they can begin to address changes that may be necessary to thrive in the post-quantum era.

IBM:    IBM:   IBM:      PA Consulting:   Security Week:   Oodaloop:    Techcircle CSO:    Inside Quantum

You Might Also Read: 

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Vulnerable Networks & Advanced Persistent Threats
Spy Agencies Warn Of New Threats From Chinese Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

IPVanish

IPVanish

IPVanish has its roots in over 15 years of network management, IP services, and content delivery services. Now we're bringing these finely honed skills to VPN.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Sabat Group

Sabat Group

Sabat Group provide relationship-driven information security & cyber security recruiting services.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Security Solutions Services (S-3)

Security Solutions Services (S-3)

S-3 specialize in crafting tailored network design, security hardware, software, and storage solutions for businesses of all sizes.

Ezer Group

Ezer Group

Ezer Group aim to help our clients drive organizational growth and improvement by strategically partnering with them to reduce cyber risk.

Prventi

Prventi

Prventi provide phishing simulation and cybersecurity awareness training for companies. Empower your employees to become your strongest defense against cyber threats.