《IBM商業價值研究院:量子時代的安全(2023)(英文版)(20頁).pdf》由會員分享,可在線閱讀,更多相關《IBM商業價值研究院:量子時代的安全(2023)(英文版)(20頁).pdf(20頁珍藏版)》請在三個皮匠報告上搜索。
1、Security in the quantum computing era The risk is real,the need is nowIBM Institute for Business Value|Expert Insights2Ray HarishankarIBM Fellow,IBM Quantum S Harishankar is responsible for leading the business and technical strategies for IBM Quantum Safe,advocating IBM capabilities and leadership
2、to clients and driving the evaluation and definition of the required technical assets and tooling for success.With his extensive client experience,Ray focuses on leveraging IBMs deep technical expertise in broader security services and post-quantum cryptography,and pragmatically applying it to benef
3、it clients.Experts on this topicDr.Sridhar MuppidiIBM Fellow,VP,and CTO,IBM S Muppidi is responsible for driving the technical strategy,architecture,and research for the IBM Security portfolio of products and services that help clients manage defenses against threats and protect digital assets.He is
4、 a results-oriented technical thought leader with 25 years of experience in building security products,delivering solution architecture for clients,driving open standards,and leading technical teams.Michael Osborne CTO,IBM Quantum S addition to his global role as CTO for IBM Quantum Safe,Michael Osb
5、orne also leads the security and privacy activities at the IBM Research center in Rschlikon(Zurich),Switzerland.His current focus includes advancing new generations of advanced cryptography and leading IBMs Quantum-Safe cryptography.This includes efforts to develop and standardize quantum-resistant
6、technology and transferring this technology to IBM products and services.Dr.Walid Rjaibi Distinguished Engineer,CTO,Data Security,IBM Rjaibi drives the research for data security as well as the technical architecture and vision for products and services.Prior to his current position,Walid held sever
7、al technical and management roles within IBM,including Research Staff Member at the IBM Zurich Research Lab,Security Architect for DB2,Development Manager,and Chief Security Architect for Data and AI.His data security work resulted in 27 granted patents,publications in leading scientific journals,an
8、d industry-proven commercial capabilities that are relied upon by thousands of organizations globally to protect critical data and meet security and compliance mandates.Dr.Joachim SchaeferTechnical Delivery Lead,IBM Quantum S Schaefer delivers solutions that help clients understand quantum threats,p
9、rioritize mitigation actions,and execute long-term crypto-transformation programs.He has broad experience delivering security solutions for the financial services industry and the telecommunications sector.Joachim holds a Ph.D.in Quantum Communication and is passionate about all topics surrounding q
10、uantum technologies.1The quantum computing era will unfold over time,but the need for quantum-safe cryptographic solutions is immediate.Developing these“quantum-safe”capabilities is crucial to maintaining data security and integrity for critical applications and infrastructure.Help is on the way.In
11、an initial round of evaluations,the US governments National Institute of Standards and Technology(NIST)has initially narrowed quantum-safe cryptographic algorithms from 82 submissions down to four finalists.Three of these four finalists were created by IBM in collaboration with industry and academic
12、 partners.Four alternate candidates are progressing to additional evaluation.Infusing crypto-agility into systems as theyre modernized is more than a CISO-driven initiative.Its an ambitious albeit necessary strategy shaped by leaders across the organization and partners outside the organization,incl
13、uding vendors,industry peers,customers and consumers,and standards bodies such as NIST.Quantum computing will profoundly alter how we think of computing and,critically,how we secure our digital economy through encryption.Key takeaways2A pivotal moment for the digital economyQuantum computing is evol
14、ving from the fantastical to the feasible.Accelerated developments show promise for solving previously intractable problems in materials science,machine learning,optimization,and much more.The potential benefits for business are immense,and the social implications of quantum technologies are likely
15、to be far-reaching.1 By decades end,practical quantum computing solutions could impact computing strategies across industries.What does this mean for business leaders?Over upcoming investment cycles,quantum computing will profoundly alter how we think of computing and,critically,how we secure our di
16、gital economy through cryptography.Developing“quantum-safe”cryptography capabilities is crucial to maintaining data security and integrity for critical applications.The quantum era will unfold over time,but the need for quantum-safe solutions is immediate.Business,technology,and security leaders fac
17、e an urgent need to develop a quantum-safe strategy and roadmap now.In fact,both the historic and current complexity of cryptography migrationseven pre-quantum computingcan require several years of strategic planning,remediation,and transformation.2 Widespread data encryption mechanisms,such as publ
18、ic-key cryptography(PKC),could become vulnerable.3Conquering a cryptography crisisWhile issues such as data encryption and operational disruption have long troubled Chief Information Security Officers(CISOs),the threat posed by emerging quantum computing capabilities is far more profound.Indeed,quan
19、tum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions.Over the next several years,widespread data encryption mechanisms,such as public-key cryptography(PKC),could become vulnerable.In fact,any classically encrypted communication
20、that could be wiretapped is at risk,and potentially already subject to exfiltration,with the intention of harvesting that data once quantum decryption solutions are viable.These tactics are referred to as“harvest now,decrypt later”attacks.As such,ensuring that data encryption remains secure requires
21、 our urgent attentioneven before quantum computing solutions become generally available.Even if some data is irrelevant or quickly loses its value to hackers,data related to national security,infrastructure,medical records,intellectual capital,and more could well retain or increase in value over tim
22、e.3(See Figure 1.)As an executive at one European bank told us,“We want to keep our data forever confidential.”4And while the simple exposure of data is threat enough,risk scenarios escalate from there.We use cryptography to protect communications networks,verify electronic transactions,and secure d
23、igital evidence.And todays smarter automobiles and airplanes rely upon highly connected digital ecosystems,with decades of service life ahead of them.Even critical infrastructure systems,which traditionally have been segregated from digital networks,are increasingly reliant on over-the-air updates a
24、nd Internet of Things(IoT)field data capture capabilities.FIGURE 1 Evergreen,ever valuableRetention requirements for various data typesToxic substance exposures(US)3Research records for cancer patients(US)Medical records(Japan)Medical records (US)Tax records (US)Years5-10 30 20+5-7 54With the power
25、of quantum computing behind them,adversaries could craft fraudulent identities for websites and create fake software downloads and software updates.Cybercriminals could launch extortion attacks by threatening to disclose harvested data.They could design fake land records or lease documents that are
26、indistinguishable from digitally encrypted originals.Considering that the digital economy is estimated to be worth$20.8 trillion by 2025,6 the repercussions could be staggering.Make no mistake.The impact is comingand its not a question of if,but how soon and how disruptive.But theres hopeful news,to
27、o.As well explore,researchers are actively developing quantum-safe remediation techniques and algorithms.The ultimate goal?For organizationsand societyto reap the substantial benefits of quantum computings power,while simultaneously shielding against the same technologies when used by cyber adversar
28、ies.Securing critical infrastructureThe earliest adopters of quantum-driven cryptography solutions are likely to be sophisticated threat actors(think nation-states)applying quantum computings potential to crack todays cryptography.For industries operating critical infrastructure,the stakes are high.
29、7In fact,in a May 2022 memo,the US government warned,“When it becomes available,a cryptan-alytically relevant quantum computer(CRQC)could jeopardize civilian and military communications,undermine supervisory and control systems for critical infrastructure,and defeat security protocols for most Inter
30、net-based financial transactions.”8 Cybersecurity experts,their business counterparts,and laypeople alike are increasingly on alert.9Consider RSA-2048,a widely used public-key cryptosystem that facilitates secure data transmission.In a 2021 survey,a majority of leading authorities believed that RCA-
31、2048 could be cracked by quantum computers within a mere 24 hours.10 How soon that might happen is a matter of debate.But the very question of when cryptography will be broken by quantum computing can be misleading,as it implies a specific threshold date that leaders can anticipate.Add the troubling
32、 truth that implementing solutions and safeguards can take longer than expected,and technology leaders are recognizing the urgent need to act now.The question:can they convince their line of business peers there is a business benefit in doing so?Make no mistake.The impact is comingand its not a ques
33、tion of if,but how soon and how disruptive.5PerspectiveThe science of cryptography meets the practice of encryptionAlthough the two terms are often used interchangeably,cryptography is the science of encrypting and decrypting information,often involving advanced degrees and a theoretical approach.Da
34、ta confidentiality,data integrity,authentication,and nonrepudiationcore concepts related to information securityare essential to cryptography.11Encryption is how information is converted into a secret code that obscures its true meaning.12 In other words,encryption is boots on the groundone practica
35、l way cryptography is used in day-to-day operations,along with decryption and authentication,as two additional examples.Today,most organizations have libraries of encryption/decryption algorithms.From there,those algorithms need to be implemented properly.The same holds true going forward,but the en
36、cryption/decryption algorithms need to be more robust and capable of resisting quantum-based exploits.This characteristic is known as being“quantum safe”and related protocols are designed to address emerging government and regulatory standards.56Crypto-agility:Algorithms to the rescueA threatening t
37、rioGiven our reliance on data encryption,the ramifications for security are profound:2.5 quintillion bytes of new data are being created every day.13 The longer we postpone the migration to quantum-safe standards,the greater the exposure for our exponentially increasing volumes of data.Below,we outl
38、ine three significant threats (see Figure 2).The threat to data confidentialityIts the primary threat we associate with quantum computers:the unauthorized decryption of confidential data in the future.Cybercriminals could target information generated from events,such as critical government or indust
39、ry gatherings,and locations,such as corporate and government venues,for future decryption.Health data,military intelligence,financial records,and more could land in the crosshairs.These scenarios raise questions about the impact of breaches on encrypted data,as well as the evolution of regulations s
40、uch as GDPR.Data confidentiality breaches could also impact improperly disposed encrypted storage media,including tapes and disk drives,and the copying of encrypted snapshots and backups.The threat to authentication protocols and digital governanceIn this scenario,a recovered private key,which is de
41、rived from a public key,can be used through remote control to fraudulently authenticate a critical system.Examples of these systems could include a utility grid or blockchain-dependent financial transactions.Hackers could initiate malicious transactions on long-term blockchains or distributed ledger
42、s.This escalates concerns related to the design of systems with long life cyclesfor example,cars,transport infrastructure,core banking applications,and blockchain applications.7The threat to data integrityCybercriminals could use quantum computing technology to recover/decrypt private keysand from t
43、here,create or manipulate digital documents and their digital signatures.This might include audit records;legal documents;attestations of assurance,originality,or provenance;and,more generally,any sensitive communications that rely upon encrypted messaging.From a legal perspective,schemes could incl
44、ude tampering with digital evidencefor example,creating or manipulating digitally signed documents that have some legal value.Or a future quantum adversary could create a signed document proving ownership with a backdated transaction date.This type of threat poses perplexing questions on the future
45、trustworthiness of digital transactions executed today.In years to come,it may be necessary to distinguish between real and fraudulent documents that both have valid signatures.FIGURE 2 The keys to the digital realmCommon examples of how cryptography is used in practice*Data confidentiality Use comb
46、ination of private-public keys to agree on a secret key,which is then used for data encryption and decryption.Identification/authentication Validate the identity of a user or a machine by using a digital certificate,which contains the public key signed by a trusted authority.Data integrity Sender si
47、gns data with a private key and receiver verifies the integrity of the data with senders public key.A public key is a cryptographic key that can be used by anyone to encrypt data intended for a specific recipient.The encrypted messages can only be decrypted by using the corresponding private key,whi
48、ch is unique to that specific recipient.*The above examples are not definitions but rather a selection of specific use cases,and not intended as an exhaustive list of how these concepts may be applied.78A quantum leap:From threats to opportunities Yes,the advent of quantum computing poses threats to
49、 cybersecurity.But its not a time to simply rip and replace existing cryptography.Its a time to regroup,reassess,and revamp.To meet the challenges posed by quantum-safe cryptography,a calculated response is called for.Quantum-safe roadmaps must address two different needs.First,they need to reinforc
50、e digital transformation initiatives based on emerging technologies and new ways of doing business.And second,they need to support remediation efforts associated with making existing data assets and services quantum safe.For some perspective,lets further distinguish between these.According to the MI
51、T Sloan Management Review,digital transformation should be embraced as continually adapting to ever-evolving environments.14 For all organizations,the transition to quantum-safe encryption creates an opportunity to transform by integrating these capabilities in ways that evolve business transactions
52、 and relationships.Remediation,on the other hand,is the mitigation of a threat or vulnerability.15 Current encryption implementations can be remediated to alleviate existing vulnerabilities.For example,crypto-agility can help organizations react faster to cryptographic vulnerabilities and future cha
53、nges to cryptographic standards.This is essential nowand was essential well before the complexities posed by quantum computing.Both transformation and remediation are complex,iterative endeavors.Additionally,organizations looking to migrate applications to the cloud and/or modernize applications on
54、the cloud need to plan for quantum-safe cryptography and crypto-agility.Organizations looking to migrate applications to the cloud and/or modernize applications on the cloud need to plan for quantum-safe cryptography and crypto-agility.9PerspectiveWhat is crypto-agility?Crypto-agility means just wha
55、t its name implies.Its a characteristic of a flexible information security system that can pivot to another encryption method without significant disruption.According to the US governments National Institute of Standards and Technology(NIST),maintaining crypto-agility is imperative to preparing for
56、a quantum-safe future.16 910Quantum-safe algorithms within reach:The NIST competitionConcerns related to quantum-safe cryptography are mountingbut theyre not new.Back in December 2016,NIST issued a request for nominations for public-key quantum-safe cryptographic algorithms,kicking off a years-long
57、process of competitive development.17 Ultimately,NIST received 82 submissions.18In July 2022,after extensive evaluation and testing,NIST narrowed its initial selections down to four algorithms(see Figure 3),three of which were created by IBM in collaboration with industry and academic partners.And,i
58、n fact,IBM was involved in developing the two primary algorithms to be implemented for most use cases:CRYSTALS-Kyber(key establishment)and CRYSTALS-Dilithium(digital signatures).19 Four alternate candidates are progressing to additional evaluation.Both algorithms involve lattice cryptography,which o
59、ffers substantial advantages,including serving as a building block for ID-based encryption and more.Based on a type of math problem called Learning with Errors(LWE),these algorithms facilitate extremely efficient and fast implementations when compared to RSA encryption.And critically,they can suppor
60、t hybrid cloud and edge use cases.CRYSTALS-Kyber and CRYSTALS-Dilithium also serve as fertile ground for future cryptographic advances.In fact,IBM z16,the industrys first generally available,quantum-safe high-performance computing solution,uses both algorithms as the underpinnings of its key encapsu
61、lation and digital signature capabilities.(See case study,“IBM zSystems:A quantum-safe crypto migration,”on page 11.)According to the World Economic Forum(WEF),NIST standards are relied upon by most private and public organizations globally.WEF notes,“These standards are the basis for todays secure
62、global communicationsbe it making a purchase on the web or transferring sensitive data.”20 For additional information,see the IBM report“Transitioning to Quantum-Safe Encryption.”21FIGURE 3 Progressing toward quantum-safe operationsCRYSTALS-Kyber Comparatively small encryption keys Keys easily excha
63、ngeable between two parties Fast operational speedCRYSTALS-Dilithium High efficiency NIST-recommended primary algorithmFALCON Suitable for applications that require smaller signatures than Dilithium providesSPHINCS+Somewhat larger and slower than Dilithium and FALCON Based on a different mathematica
64、l approach than other NIST selectionsGeneral encryptionDigital signaturesThe four NIST finalists*22*Four alternate candidates are progressing to additional evaluation.11PrepareDetermine the extent of your exposed data,systems,and applications Inventory your organizations systems for applications and
65、 understand how cryptography is currently being used.Identify near-term,achievable cryptographic maturity goals,creating defined projects to reduce risks and improve crypto-agility.DiscoverTest the new quantum-safe cryptographic algorithms(NIST)and implementations in a staging environment.However,or
66、ganizations should wait until the official release to implement the new standard in a production environment.Case studyIBM zSystems:Making the migration to quantum safe23In 2015,even before IBM put its first quantum computer on the cloud and way before NIST chose its new standards,an IBM cryptograph
67、ic research team began investigating how to quantum-proof the IBM zSystems platform.By 2018,the cryptographic team expanded its system tests to include NISTs first-round candidates as they were announced.And in the first risk assessment based on its proof of concept and test results,the team collabo
68、rated with IBM zSystems to migrate z16 to quantum-safe algorithms.The first step was to compile a cryptographic inventory of the entire IBM zSystems solution architecture.To do so,the IBM cryptography and IBM zSystems teams developed a questionnaire and sent it to all firmware and product owners.The
69、 answers provided the first complete view of cryptographic usage within the IBM zSystems stack,helping to define the critical system components that needed to be updated as part of the migration strategy.The teams also created cryptographic libraries and consulted the development teams on their migr
70、ation to quantum-safe algorithms.During this process,the cryptographic team improved the Hardware Security Modules(HSM)to support quantum-safe algorithm capabilities.The HSM provided some quantum-safe cryptographic services,but also the algorithms themselves were accelerated with a dedicated hardwar
71、e engine that was developed and implemented by the cryptographic team.The new IBM z16 was launched in April 2022,just weeks before NIST announced the winners of its six-year-long crypto challenge.With IBM z16,companies can build toward a quantum-safe future,today.1112The urgency of collaboration and
72、 partnershipInfusing crypto-agility into systems as theyre modernized and transformed is no small task.Its an ambitious albeit necessary initiative that needs the full support of line of business and senior executives.In effect,its not simply a CISO-driven initiative,but a strategic outlook shaped b
73、y leaders across the organization and partners outside the organization.Partners may include vendors,industry peers,customers and consumers,and standards bodies such as NIST.Deploying a crypto-agile governance model based on collaborationGovernance helps us understand how change should be implemente
74、d.Crypto-agility must be responsive to new standards,community guidelines,and design principles that reflect the needs of different industries,organizations,and communities.Consider that modernization and transformation involve changing the basic building blocks of encryption as well as the numerous
75、 standards built on top of those building blocks.Reducing misalignments within any particular industry is a compelling challenge,one that involves understanding its governance,standards,and design principles.Thats why many enterprises,working across standards organizations and geographies,collaborat
76、e with industry peers,stakeholders,partners,third-party assurance services,and industry regulators to coordinate efforts at a meta level.For certain industries,these issues literally cannot be solved without collaboration.For example,a large financial services back-end provider works with thousands
77、of banks,all of which need interchangeable bank transactions and consistent governance.Without collaboration around interoperability and standards,quantum-safe bank transactions will simply not be possible.Without collaboration around interoper-ability and standards,quantum-safe bank transactions wi
78、ll simply not be possible.13From our perspective,financial services organizations are one of four industries highly incentivized to develop quantum-safe capabilities.For the government sector,crypto-agility is a matter of national security,and the US government is leading the way with the NIST compe
79、tition for quantum-safe algorithms.Telecommunications is another frontrunner,with its motivationand pressureof being the connective network across all industries.As operators and service providers for critical infrastructure services such as water and power,the energy and utility industry rounds out
80、 our list.Because standards and practices are still evolving,the path forward will be discovery-driven.To expedite insights and the development of leading practices,leaders need to understand multiple viewpoints and priorities.Consortiums and standards bodies,ecosystems,and partnerships both across
81、industries and with external service providers are the most efficient ways to engage with subject-matter experts in quantum-safe cryptography.In line with that thinking,IBM is teaming up with the Global System for Mobile Communications Association(GSMA)and Vodafone in the first taskforce dedicated t
82、o global adoption of quantum-safe cryptography protections for telecommunications.This newly formed group will address the crucial step of charting a roadmap to quantum-safe networks and operational criteria.24 Engaging stakeholders via partnerships and communities of practiceEvery organization coul
83、d benefit from a Center of Excellence around quantum computing,data encryption,and cryptography.As pointed out in The Quantum Decade,enterprises can develop partnerships and join ecosystems for“deep tech”quantum know-how.What they do need on their teams is literacy in quantum computing potentiala fl
84、uency that can help scope out possibilities and define a transformative path forward.25 Also essential is a cybersecurity sub-team.This calls for one or more in-house resources who keep on top of remediation efforts associated with quantum-safe cryptography,in particular establishing priorities,iden
85、tifying issues,and troubleshooting operational constraints.This person or team should have visibility across application modernization and quantum-safe transformation efforts.Because quantum capabilities will take time to mature,external resources like communities of knowledge can facilitate sharing
86、 insights,shaping leading practices,and influencing the development of quantum-safe governance.14Action guideQuantum computing holds vast potential for driving research and advancements across a wide range of industries.But that same potential also foreshadows foundational data security risks.Our ac
87、tion guide below aligns with recommendations from the Cybersecurity and Infrastructure Security Agency(CISA),a US federal government organization.26 These recommendations are intended as a starting point for developing a quantum-safe roadmapand should be adapted to address the unique needs of any pa
88、rticular organization.15 Educate your workforce about the upcoming transition.Develop and provide any relevant training.Determine the extent of your exposed data,systems,and applications.Inventory your organizations systems for applications and understand how cryptography is currently being used.For
89、 example,how do you currently manage and implement encryption,signing of data,cryptographic keys,and so forth?Gather critical and contextual metadata around usage to create better insight-driven recommendations.Identify near-term,achievable cryptographic maturity goals,creating defined projects to r
90、educe risks and improve crypto-agility.Test the new quantum-safe cryptographic algorithms(NIST)and implementations in a staging environment.However,organizations should wait until the official release to implement the new standard in a production environment.Assess vendors for possible inclusion in
91、your organizations roadmap.Seek out partners with extensive quantum-safe cryptographic research experience.Create acquisition policies regarding quantum-safe cryptography.This process should include:Establishing service levels and requirements for the transition.Pinpointing required foundational tec
92、hnologies.Work with key vendors on a common approach to quantum-safe governance that is consistent with your organizations own cryptographic governance and security.Create and execute a plan for transitioning your organizations systems to the new cryptographic standard.This plan should include:Perfo
93、rming an interdependence analysis,for example,documenting cryptographic dependencies between business-critical systems.This can reveal issues that may impact the order of systems transition.Decommissioning old technology that will become unsupported upon publication of the new standard.Validating an
94、d testing products that incorporate the new standard.Deploy telemetry solutions to facilitate network monitoring,notification,and remediation for high-value assets,in particular those relating to encryption/decryption and cryptographic data services.Use AI-based inference and expertise-based rules t
95、o guide both automated and human-assisted decisioning.Develop a dashboard to promote visibility and observability across the quantum-safe program.Implement common governance mechanisms to promote visibility and to help ensure consistency of operations.Action guidePrepareDiscoverTransformObserve16IBM
96、 Institute for Business ValueFor two decades,the IBM Institute for Business Value has served as the thought leadership think tank for IBM.What inspires us is producing research-backed,technology-informed strategic insights that help leaders make smarter business decisions.From our unique position at
97、 the intersection of business,technology,and society,we survey,interview,and engage with thousands of executives,consumers,and experts each year,synthesizing their perspectives into credible,inspiring,and actionable insights.To stay connected and informed,sign up to receive IBVs email newsletter at
98、can also follow IBMIBV on Twitter or find us on LinkedIn at https:/ibm.co/ibv-linkedin.The right partner for a changing worldAt IBM,we collaborate with our clients,bringing together business insight,advanced research,and technology to give them a distinct advantage in todays rapidly changing environ
99、ment.Notes and sources 1 The Quantum Decade.IBM Institute for Business Value.November 2022.ibm.co/quantum-decade2 Based on internal IBM experience.3“How to preserve secrets in a quantum age.”The Economist.July 13,2022.https:/ Based on internal IBM information.5 Davis,Mel.“Toxic Substance Exposure Re
100、quires Record Retention for 30 Years.”Alert presented by CalChamber.February 18,2022.https:/ and Destruction of Health Information.”AHIMA.Accessed November 29,2022.https:/library.ahima.org/PB/RetentionDestruction#.Y4VxPi2B2fU;Nakamura,Masahiko.“Current Status of Electronic Medical Recording in Japan
101、 and Issues Involved.”JMAJ.2006.https:/www.med.or.jp/english/pdf/2006_02/070_080.pdf;“HIPAA and Medical Records Retention Requirements by State.”Total HIPAA.Accessed November 29,2022.https:/ long should I keep records?”Internal Revenue Service.Accessed November 29,2022.https:/www.irs.gov/businesses/
102、small-businesses-self-employed/how-long-should-i-keep-records6 Hayat,Zia.“Digital trust:How to unleash the trillion-dollar opportunity for our global economy.”World Economic Forum.August 17,2022.https:/www.weforum.org/agenda/2022/08/digital-trust-how-to-unleash-the-trillion-dollar-opportunity-for-ou
103、r-global-economy/7“Preparing Critical Infrastructure for Post-Quantum Cryptography.”CISA Insights.August 2022.https:/www.cisa.gov/sites/default/files/publications/cisa_insight_post_quantum_cryptography_508.pdf8“National Security Memorandum on Promoting UnitedStates Leadership in Quantum Computing Wh
104、ile Mitigating Risks to Vulnerable Cryptographic Systems.”The White House.May 4,2022.https:/www.whitehouse.gov/briefing-room/statements-releases/2022/05/04/national-security-memorandum-on-promoting-united-states-leadership-in-quantum-computing-while-mitigating-risks-to-vulnerable-cryptographic-syste
105、ms/9 Candelon,Franois,Maxime Courtaux,Gabriel Nahas,and Jean-Franois Bobier.“The U.S.,China,and Europe are ramping up a quantum computing arms race.Heres what theyll need to do to win.”Fortune.September 2,2022.https:/ Expert InsightsExpert Insights represent the opinions of thought leaders on newswo
106、rthy business and related technology topics.They are based on conversations with leading subject-matter experts from around the globe.For more information,contact the IBM Institute for Business Value at .17 10 Mosca,Michele,Dr.and Dr.Marco Piani.“2021 Quantum Threat Timeline Report.”Global Risk Inst
107、itute.January 24,2022.https:/globalriskinstitute.org/publications/2021-quantum-threat-timeline-report/11“Cryptography.”Wikipedia.Accessed November 8,2022.https:/en.wikipedia.org/wiki/Cryptography12“Encryption.”Tech Target.Accessed October 6,2022.https:/ Wise,Jason.“How Much Data is Created Every Day
108、 in 2022?”Earthweb.September 22,2022.https:/ Kane,Gerald C.“Digital Transformation Is a Misnomer.”MIT Sloan Management Review.August 7,2017.https:/sloanreview.mit.edu/article/digital-transformation-is-a-misnomer/15 Computer Security Resource Center.“Remediation.”NIST.Accessed October 11,2022.https:/
109、csrc.nist.gov/glossary/term/remediation16 Chen,Lily et al.“Report on Post-Quantum Cryptography.”NISTIR 8105.April 2016.https:/nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf17“Post-Quantum Cryptography PQC.”Computer Security Resource Center.NIST.Updated September 21,2022.https:/csrc.nist.gov/proj
110、ects/post-quantum-cryptography18 Moody,Dustin.“Lets Get Ready to RumbleThe NIST PQC Competition.”NIST.Accessed October 11,2022.https:/csrc.nist.gov/CSRC/media/Presentations/Let-s-Get-Ready-to-Rumble-The-NIST-PQC-Competiti/images-media/PQCrypto-April2018_Moody.pdf19“IBM scientists help develop NISTs
111、quantum-safe standards.”IBM Research Blog.July 6,2022.https:/ Curioni,Alessandro.“How quantum-safe cryptography will ensure a secure computing future.”World Economic Forum.July 6,2022.https:/www.weforum.org/agenda/2022/07/how-quantum-safe-cryptography-will-ensure-a-secure-computing-future/21 Muppidi
112、,Sridhar and Walid Rjaibi.“Transitioning to Quantum-Safe Encryption.”Security Intelligence.December 8,2022.https:/ Announces First Four Quantum-Resistant Cryptographic Algorithms.”NIST.July 5,2022.https:/www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-
113、algorithms Copyright IBM Corporation 2022IBM Corporation New Orchard Road Armonk,NY 10504Produced in the United States of America|December 2022IBM,the IBM logo, and Watson are trademarks of International Business Machines Corp.,registered in many jurisdictions worldwide.Other product and service nam
114、es might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the web at“Copyright and trademark information”at: document is current as of the initial date of publication and may be changed by IBM at any time.Not all offerings are available in every country in whi
115、ch IBM operates.THE INFORMATION IN THIS DOCUMENT IS PROVIDED“AS IS”WITHOUT ANY WARRANTY,EXPRESS OR IMPLIED,INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY,FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.IBM products are warranted according to the terms and cond
116、itions of the agreements under which they are provided.This report is intended for general guidance only.It is not intended to be a substitute for detailed research or the exercise of professional judgment.IBM shall not be responsible for any loss whatsoever sustained by any organization or person w
117、ho relies on this publication.The data used in this report may be derived from third-party sources and IBM does not independently verify,validate or audit such data.The results from the use of such data are provided on an“as is”basis and IBM makes no representations or warranties,express or implied.
118、EZEGKEB5-USEN-0123“How we quantum-proofed IBM z16.”IBM Research blog.October 11,2022.https:/ and Vodafone Establish Post-Quantum Telco Network Taskforce.”IBM Newsroom.Sep 29,2022.https:/ The Quantum Decade.IBM Institute for Business Value.November 2022.ibm.co/quantum-decade26“Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats.”Cybersecurity&Infrastructure Security Agency(US).July 5,2022.https:/www.cisa.gov/uscert/ncas/