Cryptography serves as the primary safeguard for our data, relying on the belief that classical computers cannot break it. However, with the potential rise of quantum computers, these encryption methods may become vulnerable. This is why it is crucial for organizational leaders to be aware of the risks to their data and explore solutions to ensure quantum-resistant security.
IBM is pioneering quantum computing while simultaneously safeguarding systems with quantum-safe technology, which is designed to withstand attacks from both classical and quantum computers. While quantum computers will be much faster at breaking certain cryptographic methods, IBM has already implemented quantum-safe algorithms. IBM z16 is the industry’s first quantum safe server that recognizes the impending ability to use quantum compute to decrypt current encryption protocols. Equipped with Crypto Express 8S technology, z16 provides quantum-safe APIs that grant access to quantum-safe algorithms.
What might cybercriminals and bad actors be capable of doing with the power of fully developed quantum computers?
- The first threat is fraudulent authentication, which would allow access to secure data stored in applications, systems, and databases.
- Secondly, potential to forge signatures, enabling capability to falsify records, audits, identities, and even tamper with blockchain assets.
- The third concern is the 'harvest now, decrypt later' strategy. While unable to decrypt data currently, bad actors may store it for future decryption using quantum computers, potentially compromising your organization's critical data.
The most important aspect of quantum safety is that preparations, such as cryptography migration, should begin promptly, as the process can take longer than anticipated. To protect against these threats, the first step is to identify cryptography-relevant components in your business applications, including both source and object code. This will provide visibility into where cryptographic functions, libraries, and methods are being used. Once identified, it is essential to map dependencies across these elements and establish a single source of truth.
IBM Application Discovery and Delivery Intelligence (ADDI) is an analytical platform that helps clients discover the relationships between application components and to enable their developers to visually analyze those relationships so they can more quickly and safely make changes. Use ADDI to accelerate the journey to becoming quantum-safe by discovering cryptography used in COBOL applications. Use these findings to identify vulnerable cryptographic calls, plan quantum safe modernization, and protect against harvesting of confidential data.
Visualize and auto-document
First major function of ADDI is that clients can visualize and auto-document their assets, turn source libraries into accurate call graphs. This means clients always have current, accurate documentation of their critical applications.
Discover application dependencies
Second, ADDI enables clients to discover application dependencies and deliver with quality. Knowing the data lineage is important because applications can
use different labels to describe information, i.e., customer name, and customer number. The question is, where is that information being sourced from? With ADDI, clients know exactly where their data is sourced.
Providing guidance
Another essential role is to guide clients in determining the optimal starting point for their application modernization and transformation initiatives. Leveraging ADDI, clients can perform the right assessment to discover business rules and recommend common APIs. Use these findings to identify vulnerable cryptographic calls, plan quantum safe modernization, and protect against harvesting of confidential data.
Return on investment
IBM commissioned Forrester Consulting to conduct a study examining the potential return on investment (ROI) and business benefits that enterprises could realize. The purpose of the study was to evaluate the potential financial impact using IBM Application Discovery and Delivery Intelligence (ADDI).
KEY STATISTICS
- · Return on investment (ROI) 163%, with an average payback period of under one year.
- · ADDI enabled cost savings by allowing organizations to retire up to 10% of their infrastructure each year.
- · ADDI accelerated application development transformation process by 10% to 20%.
- · Developer productivity increased by 20% to 30% per year over three years due to faster impact analysis through ADDI.
ADDI enabled cost savings by allowing organizations to retire up to 10% of their infrastructure each year. Some unquantified benefits include faster integration of new hires and non-mainframe developers, reduced business risk related to enterprise application environments, and improved developer satisfaction.
Source
Summary
Quantum computers pose a significant threat to public key cryptographic security, and your data is already vulnerable. To successfully navigate digital transformation and hybrid cloud adoption, clients must gain a comprehensive understanding of their applications. IBM's ADDI tool offers valuable insights into application structure and functionality.
Product Resources
ADDI Product page: Link
ADDI Demo: Link
Watsonx Code Assistant for Z Product Page: Link