Quantum Safe

PL  Patrick Leddy  RK  Ross Kramer  MD  Mat Davis  FA  Faraz Ahmad 


Business Statement

Quantum computing presents a growing threat to enterprise security, impacting everything from data encryption to core business operations across diverse industries. Customers are looking for guidance in starting their quantum safe journey.

  • Quantum Computers can in principle, perform certain mathematical computations exponentially faster than a classical computer will.
  • There will be a time when the power of quantum computing may crack public key cryptographic security protection.
  • Your data and security is already at risk for quantum attacks.
  • Cryptography impacts everything

Challenges

  1. Harvest now, decrypt later Hackers can collect data now for decryption when quantum computers are powerful enough.
  2. Replacing most of the public-key systems currently in use will take 5 to 15 years
  3. Lifetime of data means that sensitive data generated today that is not protected with quantum-safe algorithms is at risk now

With these considerations, many customers are asking the question: Ok, where do I start?

IBM’s leadership in the quantum space will guide customers in preparing for a post-quantum cryptography world.

Proof of Technology - Scope

Goal Prove out the IBM Quantum Safe technologies. Demonstrate how they will help identify Cryptographic vulnerabilities and offer a plan of attack to protect their landscape from future Quantum Attacks.

  • Quantum Safe Explorer Scan applications to discover cryptographic artifacts and vulnerabilities. Creates cryptographic inventory reports (CBOM).
  • Quantum Safe Remediator
    • Adaptive Proxy - protects communications between apps and end-user devices from quantum attacks. Positions proxy between your server & client’s
    • Performance Test Harness - test quantum safe algorithms performance in environment before deploying to production.





IBM Team Engaged
Client Engineering
Quantum Research
Customer Account Team
IBM Consulting