Skip to main content

Transitioning to Quantum-Safe Cryptography on IBM Z

A draft IBM Redbooks publication

thumbnail 

Last updated on 08 January 2025

  1. .PDF (5.1 MB)

Share this page:   

IBM Form #: SG24-8525-01


Authors: Bill White, Gregg Arquero, Ritu Bajaj, Anne Dames, Richard Kisley, Henrik Lyksborg, Charu Tejwani and Navya Ramanjulu

    menu icon

    Abstract

    As cyberattacks continue to increase, the cost and reputation impacts of data breaches remain a top concern across all enterprises. Even if sensitive data is encrypted and is of no use now, cybercriminals are harvesting that data because they might gain access to a quantum computer that can break classical cryptographic algorithms sometime in the future. Therefore, organizations must start protecting their sensitive data today by using quantum-safe cryptography.

    This IBM® Redbooks® publication reviews some potential threats to classical cryptography by way of quantum computers and how to make best use of today’s quantum-safe capabilities on the IBM Z platform. This book also provides guidance about how to get started on a quantum-safe journey and step-by-step examples for deploying IBM Z® quantum-safe capabilities.

    This publication is intended for IT managers, IT architects, system programmers, security administrators, and anyone who needs to plan for, deploy, and manage quantum-safe cryptography on the IBM Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

    Table of Contents

    Chapter 1. Cryptography in the quantum computing era

    Chapter 2. The journey to quantum protection

    Chapter 3. Using quantum-safe cryptography

    Chapter 4. Getting ready for quantum-safe cryptography

    Chapter 5. Creating a cryptographic inventory

    Chapter 6. Deploying quantum-safe capabilities

    Appendix A. Finding cryptographic attributes

    Appendix B. Generating quantum-safe keys

    Appendix C. Translating plain text into cipher text

    Appendix D. Generating and verifying digital signatures

    Appendix E. Creating a hybrid quantum-safe key exchange

    Appendix F. Generating a one-way hash

     

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.