Deploying quantum-safe capabilities
Now that your cryptographic inventory is created (as discussed in Chapter 5, “Creating a cryptographic inventory” on page 71), the preparation and planning can begin for the replacement of weak symmetric keys and public key algorithms. The algorithms and protocols at risk are discussed in “Cryptographic vulnerabilities possible with quantum computers” on page 9.
Adopting and implementing agreed upon quantum-safe standards, algorithms, and protocols in cryptographic systems helps protect against quantum computer ...

Get Transitioning to Quantum-Safe Cryptography on IBM Z now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.