IBM Details Steps to Secure Data for Quantum Era
The IBM Institute for Business Value (IBV) has published its Security in the Quantum Era report. This in-depth analysis of the quantum security landscape unveils the need for “quantum-safe” strategies today to maintain the integrity and security of highly sensitive data in the future. Additionally, the report maps out a clear path as to how organizations can work across their ecosystem to protect data from cybercriminals tapping into the power of quantum computers.
IBM security and cryptography experts provide clear actions on how organizations can prepare for potential quantum threats by educating teams on quantum-safe cryptography, discovering potential vulnerabilities by using quantum-safe cryptographic assessments, transforming operations, and observing the threat landscape. According to the report, “Over the next several years, widespread data encryption protocols, such as public key cryptography standards like RSA and ECC, could become vulnerable. In fact, any classically encrypted communication which could be wiretapped is at risk, potentially already exposed to exfiltration, with the intention of harvesting that data once quantum decryption solutions are viable.”
Considering that the digital economy is estimated to be worth $20.8 trillion by 2025, the repercussions could be staggering, according to World Economic Forum. Data related to national security, infrastructure, medical records, and intellectual capital can retain or increase in value over time. As such, cybercriminals can employ “harvest now, decrypt later” strategies to steal data that could be decrypted once quantum computers reach a critical mass. Additionally, cryptography is used to secure highly complex and critical infrastructure networks and global digital ecosystems, all of which could take decades to secure against quantum threats.
IBM has spent years building a global team of top cryptography experts to develop quantum-safe schemes and preparation plans. Just in the last year, IBM has deployed the industry’s first quantum-safe system, IBM z16; launched a suite of IBM Quantum Safe services; contributed to the development of three of the four algorithms chosen by NIST for post-quantum cryptography standardization; and became a founding member of the GSMA Post-Quantum Telco Network Taskforce.