Creating a cryptographic inventory
Before transitioning to quantum-safe algorithms, it is important to create a cryptographic inventory that covers all aspects of cryptography in your enterprise. This process includes classifying the data to help you identify where your sensitive data is stored inside and outside the IBM Z environment.
The cryptographic inventory also lists the certificates, encryption protocols, algorithms, and key lengths that are used and indicates those that are weakened by quantum computers. For more information about for ...

Get Transitioning to Quantum-Safe Cryptography on IBM Z now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.