Cryptography in the quantum computing era
For decades, organizations used cryptographic algorithms to protect their most sensitive data and communications in computer systems, networks, and storage devices. Imagine if an adversary or cybercriminal can break those cryptographic algorithms that you relied on for many years. What are the potential impacts on your business?
Once considered impossible, attacks that can compromise today’s cryptographic algorithms can become possible with a powerful quantum computer. Your protected data can be stolen, ...
Get Transitioning to Quantum-Safe Cryptography on IBM Z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.