Quantum-Safe Encryption Storage
Amir Zahoor
Business Leader | Volunteer | Board Member | Change Agent Leader of IBM Storage hardware/software architects who co-create solutions with their clients to drive their success.
Before I dive into telling you about FCM4 Quantum-Safe encryption, I'd like to start by sharing our Quantum roadmap. In 2023, IBM demonstrated that Quantum computers have surpassed classical computers in computational ability. This roadmap illustrates how quantum technology will play a crucial role in enhancing our lives in the future. The following picture shows two tracks: one for development and the other for technology.
The reason I’m sharing this roadmap with you is to emphasize that the future will arrive sooner than we anticipate. We need to safeguard our data now, rather than waiting, as delaying could give malicious actors an opportunity to exploit our vulnerabilities. In the not-too-distant future, quantum computers will become "cryptographically relevant" and capable of attacking conventional asymmetric cryptography, such as RSA, ECC, Diffie-Hellman, DSA, etc.?
?We have been developing Flash Core Modules (FCM) since 2014, and this year we introduced FCM4, the world’s first quantum-safe, self-encrypting custom flash module.
On August 14th, 2024, the National Institute of Standards and Technology (NIST) introduced three standards:
领英推荐
What makes Solid State Drives (SSDs) quantum-safe? The goal is to make cryptography resilient even against quantum computer attacks. The term for such a threat is CRQC, which stands for Cryptographically Relevant Quantum Computer. Simply put, FCM4 enhances conventional asymmetric cryptographic algorithms, which would otherwise be easily broken by CRQC.
FCM4 is now protected by hybrid cryptography, which utilizes both quantum-safe cryptographic methods, such as CRYSTALS-Dilithium and KYBER, and conventional cryptography. The cryptographic protection is only as strong as the stronger of the two algorithms. In other words, an attacker would need to break both the conventional and the quantum-safe algorithms to access your valuable data.
One of the advantages of this hybrid approach is the peace of mind it provides, ensuring data security even if one or the other algorithm is compromised, especially considering that quantum-safe algorithms are relatively new.
Thank you and please let me know if you have any questions and comments.