Enabling Quantum-Safe Cryptography

Quantum technology is an emerging field of physics and engineering and is a class of technology that works by using the principles of quantum mechanics, which is the physics of sub-atomic particles, including quantum entanglement and quantum superposition. Quantum technology is rapidly advancing and now IBM has announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. 

IBM's guidance is designed to help organisations prepare for the potential threat posed by quantum computers, which could render current encryption methods obsolete. This recognises that Quantum systems are on a path to solve previously unsolved problems beneficial to business and science, but this progress also poses security risks. 

As quantum computers continue to advance, they will reach the ability to break the most widely used security protocols in the world. What IBM calls Quantum Safe technology is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers. “By decade’s end, practical quantum computing solutions could impact computing strategies across industries. But it will also profoundly alter how we secure our digital data fabric through cryptography. Organisations are already examining how to upgrade their cyber security to prepare for this new computational era,” says IBM.

IBM's Quantum Safe Roadmap is designed to help government agencies and business meet the requirements and the deadlines for quantum safe cryptography and defines an end-to-end solution.

The roadmap details five stages of preparation for quantum-safe cryptography, starting with educating stakeholders about the need for quantum-safe cryptography and identifying sensitive data that may require quantum-safe protection.  “This roadmap serves as a commitment to transparency, predictability, and confidence as we guide industries along their journey to post-quantum cryptography... There’s a lot happening at once, new algorithms, standards, best practices, and guidance from federal agencies. We hope that this roadmap will serve as a navigational tool through this complex landscape,” according to IBM. 

The roadmap includes recommendations for implementing quantum-resistant encryption protocols and testing their effectiveness, as well as monitoring the security landscape for emerging quantum threats.

IBM Quantum Safe technology is designed to help clients prepare for the post-quantum era via: 

  •  IBM Quantum Safe Explorer  - to enable organisations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities and to build a Crypto-graphy Bill of Materials. This allows teams to view and aggregate potential risks into one central location.
  • IBM Quantum Safe Advisor - allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation and analyzes cryptographic posture and compliance to prioritize risks.
  • IBM Quantum Safe Remediator - enables organisations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

Analysts are predicting that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto-currencies, and communications systems vulnerable to significant cyber security threats. On this basis, organisations, technology providers and Internet standards will soon be required to transition to quantum-safe encryption. 

According to IBM, the transition to quantum-safe crypto-graphy will take time, but organisations can begin preparing now by evaluating their current encryption methods and infrastructure. 

  • NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world implementations while the US National Institute of Standards and Technology (NIST) has launched a competition to identify quantum-safe encryption algorithms. 
  • The US National Security Agency (NSA) has announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House released requirements for federal agencies to submit a crypto-graphic inventory of systems that could be vulnerable to cryptographically relevant quantum computers.

As quantum computing technology advances, it will become increasingly important for organisations to adopt quantum-safe encryption methods to protect sensitive data and maintain the security of their systems. IBM's Quantum Safe Roadmap and technology will expose organisations to their existing crypto-graphic landscape so they can begin to address changes that may be necessary to thrive in the post-quantum era.

IBM:    IBM:   IBM:      PA Consulting:   Security Week:   Oodaloop:    Techcircle CSO:    Inside Quantum

You Might Also Read: 

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Vulnerable Networks & Advanced Persistent Threats
Spy Agencies Warn Of New Threats From Chinese Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO Cooperative Cyber Defence Centre (CCDCOE)

NATO CCDCOE's mission is to enhance the capability, cooperation and information sharing among NATO, NATO nations and partners in cyber defence.

Malwarebytes

Malwarebytes

Malwarebytes provides artificial intelligence-powered technology that stops cyberattacks before they can compromise computers and endpoints.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

TechForing Ltd.

TechForing Ltd.

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.