Using quantum-safe cryptography
In this chapter, various use cases are introduced to illustrate the threats that many organizations face with the rise of quantum computing for use cases that are related to confidentiality, integrity, authentication, and nonrepudiation.
Across these use cases, the challenges are addressed and how the quantum-safe capabilities that are provided with IBM z16 can help to overcome these challenges and ensure the security of sensitive and valuable data into the future.
Also, each use case includes applications for ...
Get Transitioning to Quantum-Safe Cryptography on IBM Z now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.