Finding cryptographic attributes
The purpose of this appendix is to introduce a process that can be used when creating your cryptographic inventory with the available tools. The output from this process helps you to make qualified choices in terms of protecting your programs and applications against future threats from quantum computer attacks, which are also known as a cryptographically relevant quantum computer (CRQC) attacks.
The suggested process requires manual analysis to discover which cryptographic algorithms, key lengths, and key labels ...
Get Transitioning to Quantum-Safe Cryptography on IBM Z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.