Enabling Quantum-Safe Cryptography

Quantum technology is an emerging field of physics and engineering and is a class of technology that works by using the principles of quantum mechanics, which is the physics of sub-atomic particles, including quantum entanglement and quantum superposition. Quantum technology is rapidly advancing and now IBM has announced an end-to-end solution to prepare organisations to adopt quantum-safe cryptography. 

IBM's guidance is designed to help organisations prepare for the potential threat posed by quantum computers, which could render current encryption methods obsolete. This recognises that Quantum systems are on a path to solve previously unsolved problems beneficial to business and science, but this progress also poses security risks. 

As quantum computers continue to advance, they will reach the ability to break the most widely used security protocols in the world. What IBM calls Quantum Safe technology is a set of tools and capabilities that integrates IBM’s deep security expertise. Quantum-safe cryptography is a technique to identify algorithms that are resistant to attacks by both classical and quantum computers. “By decade’s end, practical quantum computing solutions could impact computing strategies across industries. But it will also profoundly alter how we secure our digital data fabric through cryptography. Organisations are already examining how to upgrade their cyber security to prepare for this new computational era,” says IBM.

IBM's Quantum Safe Roadmap is designed to help government agencies and business meet the requirements and the deadlines for quantum safe cryptography and defines an end-to-end solution.

The roadmap details five stages of preparation for quantum-safe cryptography, starting with educating stakeholders about the need for quantum-safe cryptography and identifying sensitive data that may require quantum-safe protection.  “This roadmap serves as a commitment to transparency, predictability, and confidence as we guide industries along their journey to post-quantum cryptography... There’s a lot happening at once, new algorithms, standards, best practices, and guidance from federal agencies. We hope that this roadmap will serve as a navigational tool through this complex landscape,” according to IBM. 

The roadmap includes recommendations for implementing quantum-resistant encryption protocols and testing their effectiveness, as well as monitoring the security landscape for emerging quantum threats.

IBM Quantum Safe technology is designed to help clients prepare for the post-quantum era via: 

  •  IBM Quantum Safe Explorer  - to enable organisations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities and to build a Crypto-graphy Bill of Materials. This allows teams to view and aggregate potential risks into one central location.
  • IBM Quantum Safe Advisor - allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation and analyzes cryptographic posture and compliance to prioritize risks.
  • IBM Quantum Safe Remediator - enables organisations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

Analysts are predicting that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, crypto-currencies, and communications systems vulnerable to significant cyber security threats. On this basis, organisations, technology providers and Internet standards will soon be required to transition to quantum-safe encryption. 

According to IBM, the transition to quantum-safe crypto-graphy will take time, but organisations can begin preparing now by evaluating their current encryption methods and infrastructure. 

  • NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world implementations while the US National Institute of Standards and Technology (NIST) has launched a competition to identify quantum-safe encryption algorithms. 
  • The US National Security Agency (NSA) has announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House released requirements for federal agencies to submit a crypto-graphic inventory of systems that could be vulnerable to cryptographically relevant quantum computers.

As quantum computing technology advances, it will become increasingly important for organisations to adopt quantum-safe encryption methods to protect sensitive data and maintain the security of their systems. IBM's Quantum Safe Roadmap and technology will expose organisations to their existing crypto-graphic landscape so they can begin to address changes that may be necessary to thrive in the post-quantum era.

IBM:    IBM:   IBM:      PA Consulting:   Security Week:   Oodaloop:    Techcircle CSO:    Inside Quantum

You Might Also Read: 

Quantum Computing Raises As Many Problems As It Solves:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Vulnerable Networks & Advanced Persistent Threats
Spy Agencies Warn Of New Threats From Chinese Hackers »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

EverC

EverC

EverC (formerly EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Swascan

Swascan

Swascan is the first all-in-one, GDPR Compliant, Cloud Security Suite Platform. GDPR Assessment, Web Application Scan, Network Scan, Code Review.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.