WHAT IS QUANTUM COMPUTING?

Quantum computing is not based on the mathematical principles that govern classical computing. Instead, it is based on the science of quantum mechanics, where computations are driven by “qubits” rather than bits.

Whereas the math used with binary bits produces discrete, fixed values, qubits can exist in multiple states at the same time. This is key for why quantum computing is so different, namely because qubits do not have a fixed value, and exist in an indeterminate state. With so much fluidity in knowing their value for computational purposes, they can handle far greater complexity than the binary model that defines classical computing.

This has significant implications for data security. Quantum computers will be able to create and support entirely new models of encryption based on quantum cryptography. This is a future-forward scenario that would be virtually impossible to hack with today’s technologies. For now, the more pressing implication is the impact these developments in quantum computing will have on the present state of data encryption.

Product Portfolio

WHAT ARE THE THREATS AND RISKS?

Quantum computing may seem far removed from well-established encryption methods including asymmetric, such as RSA, and symmetric, such as AES. Encryption solutions often use a mix of these to provide a faster, more secure overall approach that leverages the strengths of both models.

These encryption models take a common approach to data security—they are based on mathematical principles, specifically around factoring integers into prime numbers. Known as the “factoring problem”, the larger the prime numbers, the longer the encryption keys become, and the more difficult it becomes to break the code. While this model can theoretically keep scaling with larger prime numbers, its utility will be constrained by the computational abilities of the classical computing model.

As the field of quantum computing advances, new algorithms grounded in quantum mechanics are being developed with computational capabilities that far outstrip these factoring-based models built on mathematical principles. In other words, it won’t be enough just to keep building bigger encryption keys – the fundamental approach to encryption will need to change to safeguard data.

The two most important algorithms relative to quantum computing and encryption are named for their originators, Shor and Grover. When these algorithms can run on a large-scale quantum computer, they will be able to crack the strongest encryption codes, at which point all encrypted data will be at risk. This means that data being encrypted today may not be secure once quantum computers become more available.

HOW TO PROTECT YOUR DATA?

Organizations need to determine how many years they need to keep their encrypted data. Then, organizations need to make their IT infrastructure ‘quantum-safe’ before large-scale quantum computers become readily available. Protecting data will involve implementing quantum-resistant algorithms on existing classical computers, and re-encrypting all data with those algorithms. Keep in mind that data being encrypted and stored today will certainly be at risk if large-scale quantum computers enter the market before that data reaches the end of its valuable life.

OUR QUANTUM APPROACH

ibm/SEIMless is closely monitoring the latest developments in the areas of quantum computing and quantum resistant cryptography to ensure that our solutions remain crypto agile and are “quantum-proof”.  We focus our efforts on the quantum 4:

Quantum Computing –The building and development of quantum based computers. While ibm/SEIMless is not actively involved in the development of quantum computers, we regularly monitor industry progress because of its impact on cryptography.

Quantum Resistant Crypto (QRC) – NIST-led development of new algorithms and protocols that are “quantum proof” meaning that they they cannot be broken by quantum computers. ibm/SEIMless is actively involved in this area in order to ensure that our solutions are crypto agile—our platforms will have the memory, compute and flexibility to add post quantum cryptography (PQC) algorithms as they become available for use.

Quantum Random Number Generation (QRNG) – Utilization of quantum principles to generate random numbers (or entropy) for use in cryptography. These can be used with traditional crypto and/or QRC. ibm/SEIMless is actively involved in this area in order to enhance our hardware security modules and cryptographic key managers.

Quantum Key Distribution (QKD) – The distribution of random between two endpoints where “observing” the bits changes them. ibm/SEIMless’s  technology partners, are developing solutions that use this technology.  Contact us to learn more.

Encryption Solutions:

EXODUS TRANSPARENT ENCRYPTION FOR SAP HANA

EXODUS Transparent Encryption provides a proven approach to safeguarding SAP HANA data that meets rigorous security, data governance and compliance requirements.

EXODUS DATA SECURITY MANAGER

Physical and virtual appliances enable centralized, consistent management of encryption, access policies, and security intelligence.

EXODUS TRANSPARENT ENCRYPTION

Provides high-performance encryption and least-privileged access controls for files, directories, and volumes.

LIVE DATA TRANSFORMATION EXTENSION

Extend EXODUS Transparent Encryption to enable the capability for encryption and key rotation without downtime.

EXODUS CONTAINER SECURITY

Extend EXODUS Transparent Encryption encryption, privileged user access control, security intelligence log collection to your environment.

EXODUS DATA SECURITY PLATFORM

The EXODUS Data Security Platform makes it easy and efficient to manage data-at-rest security across the organization.

SECURITY INTELLIGENCE LOGS

Detailed data access audit logs delivered by EXODUS Transparent Encryption for compliance, identification of unauthorized access attempts, and to build baselines of authorized user access patterns.

EXODUS APPLICATION ENCRYPTION

Easily add encryption into existing applications with standards-based APIs and centralized management.

EXODUS PROTECTION FOR TERADATA DATABASE

Comprehensive, granular controls required to secure the most sensitive assets across your Teradata environments.

EXODUS ORCHESTRATOR

A virtual appliance to simplify the automation of deployment, configuration, management and monitoring of data encryption solutions.

PROTECTV

Full disk encryption of physical servers, virtual machines, and cloud instances.

Encryption Technlogies

What is encryption and why is it important?

Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a “key”) that allows them to change the information back to its original, readable form.

Encryption is important because it allows you to securely protect data that you don’t want anyone else to have access to ibm/SEIMless specializes in this area with solutions that protect your data in transit, while at rest or both. We protect corporate secrets, government secure classified information, and even  individuals wishing to protect personal information against things like identity theft.

Contact us to discuss your unique requirements we have the solutions to meet any need.