Select the directory option from the above "Directory" header!

Menu
IBM unveils end-to-end, quantum-safe tools to secure business, government data

IBM unveils end-to-end, quantum-safe tools to secure business, government data

Quantum Safe Technology combines expertise across cryptography and critical infrastructure to address the future security risks posed by quantum computing.

Credit: sakkmesterke/Shutterstock

Technology giant IBM has debuted a new set of tools and capabilities designed as an end-to-end, quantum-safe solution to secure organisations and governmental agencies as they head toward the post-quantum computing era.

Announced at its annual Think conference in Orlando, Florida, Quantum Safe technology combines expertise across cryptography and critical infrastructure to address the potential future security risks that quantum computing poses, according to the company.

IBM also unveiled the Quantum Safe Roadmap to guide industries along their journey to post-quantum cryptography.

Security experts and scientists predict that quantum computers will one day be able to break commonly used encryption methods rendering email, secure banking, cryptocurrencies, and communications systems vulnerable to significant cybersecurity threats.

Organisations, technology providers, and internet standards will therefore soon be required to transition to quantum-safe encryption.

NATO has already begun testing quantum-safe solutions to investigate the feasibility and practicality of such technology for real-world implementations while the US National Institute of Standards and Technology (NIST) launched a competition to identify and standardise quantum-safe encryption algorithms.

Furthermore, the US National Security Agency (NSA) announced new requirements for national security systems to transition to quantum-safe algorithms by 2025, and the White House released requirements for federal agencies to submit a cryptographic inventory of systems that could be vulnerable to cryptographically relevant quantum computers.

New capabilities prepare for post-quantum era in three ways

IBM’s new set of capabilities is designed to help clients prepare for the post-quantum era in three key ways, the firm said in a press release: 

  • IBM Quantum Safe Explorer enables organisations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities, and build a cryptography bill of materials (CBOM) that allows teams to view and aggregate potential risks into one central location.
  • IBM Quantum Safe Advisor allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation, analysing cryptographic posture and compliance to prioritise risks.
  • IBM Quantum Safe Remediator enables organisations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

IBM Quantum Safe Roadmap charts milestones toward quantum-secure technology

The IBM Quantum Safe Roadmap is IBM’s first blueprint that charts the technology milestones toward advanced quantum-safe technology, engineered to help organisations address anticipated cryptographic standards and requirements, and protect systems against emerging vulnerabilities, the firm stated. IBM said this is comprised of three key actions:

  • Identify cryptography usage, analysing dependencies, and generating a CBOM.
  • Analyse the cryptography posture of vulnerabilities and prioritise remediation based on risks.
  • Remediate and mitigate with crypto-agility (the ability to switch quickly between encryption mechanisms such as algorithms and cryptographic primitives while minimising the impact on other systems) and built-in automation.

Quantum-safe encryption key to addressing quantum threats

Quantum-safe encryption is key to addressing the quantum-based cybersecurity threats of the future. Organisations are well advised to get ahead of the quantum-safe encryption curve, starting with understanding what data has the longest life and how this might be at risk from future threats.

Companies that struggle should focus on identity, because even if they secure all their encryption, if someone can access their identity system, then anyone can gain “legitimate” access to systems and infrastructure.

Setting up years-to-quantum (Y2Q) migration as a bespoke project and giving it the firepower it needs to ensure success and a smooth transition is another key step, as is adopting a crypto-agile approach when thinking about any infrastructure overhaul.

This means that organisations should use solutions that keep the tried and tested classical cryptography used today alongside one or more post-quantum algorithms, offering greater assurance against both traditional attacks and future threats.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags quantum technologiesIBM

Show Comments