Enabling Quantum-Safe Cryptography

Quantum technology is an emerging field of physics and engineering and is a class of technology that works by using the principles of quantum mechanics, which is the physics of sub-atomic particles, including quantum entanglement and quantum superposition. Quantum technology is rapidly advancing and now IBM has announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. 

IBM's guidance is designed to help organisations prepare for the potential threat posed by quantum computers, which could render current encryption methods obsolete. This recognises that Quantum systems are on a path to solve previously unsolved problems beneficial to business and science, but this progress also poses security risks. 

As quantum computers continue to advance, they will reach the ability to break the most widely used security protocols in the world. What IBM calls Quantum Safe technology is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers. “By decade’s end, practical quantum computing solutions could impact computing strategies across industries. But it will also profoundly alter how we secure our digital data fabric through cryptography. Organisations are already examining how to upgrade their cyber security to prepare for this new computational era,” says IBM.

IBM's Quantum Safe Roadmap is designed to help government agencies and business meet the requirements and the deadlines for quantum safe cryptography and defines an end-to-end solution.

The roadmap details five stages of preparation for quantum-safe cryptography, starting with educating stakeholders about the need for quantum-safe cryptography and identifying sensitive data that may require quantum-safe protection.  “This roadmap serves as a commitment to transparency, predictability, and confidence as we guide industries along their journey to post-quantum cryptography... There’s a lot happening at once, new algorithms, standards, best practices, and guidance from federal agencies. We hope that this roadmap will serve as a navigational tool through this complex landscape,” according to IBM. 

The roadmap includes recommendations for implementing quantum-resistant encryption protocols and testing their effectiveness, as well as monitoring the security landscape for emerging quantum threats.

IBM Quantum Safe technology is designed to help clients prepare for the post-quantum era via: 

  •  IBM Quantum Safe Explorer  - to enable organisations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities and to build a Crypto-graphy Bill of Materials. This allows teams to view and aggregate potential risks into one central location.
  • IBM Quantum Safe Advisor - allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation and analyzes cryptographic posture and compliance to prioritize risks.
  • IBM Quantum Safe Remediator - enables organisations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

Analysts are predicting that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto-currencies, and communications systems vulnerable to significant cyber security threats. On this basis, organisations, technology providers and Internet standards will soon be required to transition to quantum-safe encryption. 

According to IBM, the transition to quantum-safe crypto-graphy will take time, but organisations can begin preparing now by evaluating their current encryption methods and infrastructure. 

  • NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world implementations while the US National Institute of Standards and Technology (NIST) has launched a competition to identify quantum-safe encryption algorithms. 
  • The US National Security Agency (NSA) has announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House released requirements for federal agencies to submit a crypto-graphic inventory of systems that could be vulnerable to cryptographically relevant quantum computers.

As quantum computing technology advances, it will become increasingly important for organisations to adopt quantum-safe encryption methods to protect sensitive data and maintain the security of their systems. IBM's Quantum Safe Roadmap and technology will expose organisations to their existing crypto-graphic landscape so they can begin to address changes that may be necessary to thrive in the post-quantum era.

IBM:    IBM:   IBM:      PA Consulting:   Security Week:   Oodaloop:    Techcircle CSO:    Inside Quantum

You Might Also Read: 

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Vulnerable Networks & Advanced Persistent Threats
Spy Agencies Warn Of New Threats From Chinese Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

SkOUT Secure Intelligence

SkOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Cyscale

Cyscale

Cyscale is a consultancy and development agency helping Enterprises adopt and migrate to the Cloud by providing an Automated Cloud Security Platform.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.