{"id":79033,"date":"2024-09-09T08:37:09","date_gmt":"2024-09-09T11:37:09","guid":{"rendered":"https:\/\/abes.org.br\/?p=79033"},"modified":"2024-08-21T20:46:18","modified_gmt":"2024-08-21T23:46:18","slug":"algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/","title":{"rendered":"Algorithms developed by IBM are the world&#039;s first post-quantum cryptography standards"},"content":{"rendered":"<p style=\"text-align: center;\"><i>With the rapid advancement of quantum computers, the US National Institute of Standards and Technology (NIST) has published new algorithms developed by IBM, in collaboration with industry allies, to protect data against potential quantum attacks.<\/i><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-79034 aligncenter\" src=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg\" alt=\"\" width=\"388\" height=\"218\" \/><\/p>\n<p>Two\u00a0<a href=\"https:\/\/urldefense.com\/v3\/__https:\/research.ibm.com\/blog\/nist-pqc-standards__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA62pnkfWw$\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/research.ibm.com\/blog\/nist-pqc-standards__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA62pnkfWw$&amp;source=gmail&amp;ust=1724366254099000&amp;usg=AOvVaw3C_RxqXI4waix3BsEOudEL\">algorithms developed by IBM<\/a>\u00a0were officially formalized within the world&#039;s first three post-quantum cryptography models and published today by the U.S. Department of Commerce&#039;s National Institute of Standards and Technology (NIST).<\/p>\n<p>The models include three post-quantum cryptography algorithms: two of them, ML-KEM (originally known as CRYSTAL-Kyber) and ML-DSA (originally CRYSTAL-Dilithium) were developed by IBM researchers in collaboration with allies from various industries and academia. The third published algorithm, SLH-DSA (initially presented as SPHINCS+) was co-developed by a researcher who has since joined IBM. In addition, a fourth IBM-developed algorithm, FN-DSA (originally called FALSE), has been selected for future standardization.<\/p>\n<p>The official publication of these algorithms is a crucial milestone in advancing the protection of the world\u2019s encrypted data against cyberattacks that could be attempted using the unique power of quantum computers, as they rapidly advance towards cryptographic relevance. That is, to the point where quantum computers will leverage enough computing power to crack the encryption models used by most of the world\u2019s data and infrastructure today.<\/p>\n<p>\u201cIBM\u2019s mission in quantum computing is two-pronged: to deliver useful quantum computing to the world and to make the world quantum-safe. We are thrilled with the incredible progress we have made with today\u2019s quantum computers, which are being used in industries around the world to explore problems as we move toward fully error-corrected systems,\u201d said Jay Gambetta, vice president of IBM Quantum. \u201cHowever, we understand that these advances can be a game-changer in the security of our most sensitive data and systems. NIST\u2019s publication of the first three global standards for post-quantum cryptography marks an important step in our efforts to build a quantum-safe future with quantum computing.\u201d<\/p>\n<p>As a completely new branch of computing, quantum computers are rapidly accelerating towards becoming useful, large-scale systems, as evidenced by the hardware and software milestones achieved by IBM according to its roadmap or\u00a0<a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.youtube.com\/watch?v=d5aIx79OTps__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA5notHQyg$\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.youtube.com\/watch?v%3Dd5aIx79OTps__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA5notHQyg$&amp;source=gmail&amp;ust=1724366254099000&amp;usg=AOvVaw2PDStIxcYhj1y9rvHxvAEm\">Quantum Development Roadmap<\/a>. For example, IBM projects that it will deliver its first quantum error correction system by 2029. This system is expected to perform hundreds of millions of quantum operations to deliver accurate results for complex and valuable problems that are currently inaccessible to classical computers. Looking ahead, the roadmap includes plans to expand this system so that it can perform more than a billion quantum operations by 2033. As IBM moves toward these goals, the company has already equipped experts in healthcare and life sciences, finance, materials development, logistics, and other fields with quantum utility systems at scale to begin applying and scaling their most pressing quantum computing challenges as they advance.<\/p>\n<p>However, the advent of more powerful quantum computers could pose risks to current cybersecurity protocols. As their speed and error correction capabilities increase, they are likely to also include the ability to decrypt today\u2019s most widely used encryption schemes, such as RSA, which has long protected the world\u2019s data. Building on work that began several decades ago, IBM\u2019s team of the world\u2019s leading cryptographers continues to lead the industry in developing algorithms to protect data against future threats that are now positioned to eventually replace current encryption schemes.<\/p>\n<p>The models recently released by NIST are designed to safeguard data exchanged over public networks, as well as digital signatures for identity authentication. Now formalized, they will set the standard for governments and industries around the world to begin adopting post-quantum cybersecurity strategies.<\/p>\n<p>In 2016, NIST asked cryptographers from around the world to develop and submit new quantum-safe cryptographic schemes to be considered for future standardization. In 2022, from the 69 selected participants, four cryptographic algorithms were selected for further evaluation: CRYSTAL S-Kyber, CRYSTAL S-Dilithium, Falcon, and SPHINCS+.<\/p>\n<p>In addition to ongoing evaluations to announce Falcon as the fourth official standard, NIST continues to identify and evaluate additional algorithms to diversify its toolkit of post-quantum cryptographic algorithms, including others developed by IBM researchers. IBM cryptographers are among the pioneers in expanding these tools, including three new digital signature systems that have already been submitted for consideration by NIST and are undergoing initial rounds of evaluation.<\/p>\n<p>To further its mission to make the world quantum safe, IBM continues to explore how post-quantum cryptography can be integrated into many of its own products, including the IBM z16 and IBM Cloud. In 2023, the company unveiled the IBM Quantum Safe roadmap, a three-step plan to chart milestones toward increasingly advanced quantum-safe technology, defined by the discovery, observation, and transformation phases. In addition to the roadmap, the company also introduced IBM Quantum Safe technology and IBM Quantum Safe transformation services to help clients on their path to quantum safety. These technologies include the introduction of the Cryptographic Bill of Materials (CBOM), a new standard for capturing and exchanging information about cryptographic assets in software and systems.<\/p>\n<p>For more information about IBM Quantum Safe technologies and available services, visit\u00a0<a href=\"https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/quantum\/quantum-safe__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA4GK87y4g$\" target=\"_blank\" rel=\"noopener\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/urldefense.com\/v3\/__https:\/www.ibm.com\/quantum\/quantum-safe__;!!N96JrnIq8IfO5w!nVaqpoTHxU0lRToG-hluk7bi0pP9Ts7APod7QvgRtn_CstdF9Yc0GN50HZPp9_uEqePJ4ZagBIQaP-dUjemrkA4GK87y4g$&amp;source=gmail&amp;ust=1724366254099000&amp;usg=AOvVaw0Xbvj3gmxJnenp4GBQcCeu\">site<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Com o r\u00e1pido avan\u00e7o dos computadores qu\u00e2nticos, o Instituto Nacional de Padr\u00f5es e Tecnologia dos Estados Unidos (NIST) publicou novos algoritmos desenvolvidos pela IBM, em colabora\u00e7\u00e3o com aliados do setor, para proteger dados contra potenciais ataques qu\u00e2nticos Dois\u00a0algoritmos desenvolvidos pela IBM\u00a0foram formalizados oficialmente dentro dos tr\u00eas primeiros modelos de criptografia p\u00f3s-qu\u00e2ntica do mundo e publicados [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":79034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[39,19],"tags":[5950,5948,5949],"class_list":["post-79033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-coluna-4","category-ultimas-noticias","tag-ciberseguranca-pos-quantica","tag-criptografia-pos-quantica","tag-mundo-quantico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo - ABES\" \/>\n<meta property=\"og:description\" content=\"Com o r\u00e1pido avan\u00e7o dos computadores qu\u00e2nticos, o Instituto Nacional de Padr\u00f5es e Tecnologia dos Estados Unidos (NIST) publicou novos algoritmos desenvolvidos pela IBM, em colabora\u00e7\u00e3o com aliados do setor, para proteger dados contra potenciais ataques qu\u00e2nticos Dois\u00a0algoritmos desenvolvidos pela IBM\u00a0foram formalizados oficialmente dentro dos tr\u00eas primeiros modelos de criptografia p\u00f3s-qu\u00e2ntica do mundo e publicados [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T11:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"895\" \/>\n\t<meta property=\"og:image:height\" content=\"503\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor ABES\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor ABES\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/\"},\"author\":{\"name\":\"Editor ABES\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\"},\"headline\":\"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo\",\"datePublished\":\"2024-09-09T11:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/\"},\"wordCount\":1098,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IBM-quantica.jpg\",\"keywords\":[\"ciberseguran\u00e7a p\u00f3s-qu\u00e2ntica\",\"criptografia p\u00f3s-qu\u00e2ntica\",\"mundo qu\u00e2ntico\"],\"articleSection\":[\"-Coluna 4\",\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/\",\"name\":\"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IBM-quantica.jpg\",\"datePublished\":\"2024-09-09T11:37:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IBM-quantica.jpg\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/IBM-quantica.jpg\",\"width\":895,\"height\":503},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/d65ed84c8883a123fe668129fd6a7ed3\",\"name\":\"Editor ABES\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g\",\"caption\":\"Editor ABES\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/editor-abes\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Algorithms developed by IBM are the world&#039;s first post-quantum cryptography standards - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/","og_locale":"en_US","og_type":"article","og_title":"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo - ABES","og_description":"Com o r\u00e1pido avan\u00e7o dos computadores qu\u00e2nticos, o Instituto Nacional de Padr\u00f5es e Tecnologia dos Estados Unidos (NIST) publicou novos algoritmos desenvolvidos pela IBM, em colabora\u00e7\u00e3o com aliados do setor, para proteger dados contra potenciais ataques qu\u00e2nticos Dois\u00a0algoritmos desenvolvidos pela IBM\u00a0foram formalizados oficialmente dentro dos tr\u00eas primeiros modelos de criptografia p\u00f3s-qu\u00e2ntica do mundo e publicados [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2024-09-09T11:37:09+00:00","og_image":[{"width":895,"height":503,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg","type":"image\/jpeg"}],"author":"Editor ABES","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"Editor ABES","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/"},"author":{"name":"Editor ABES","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3"},"headline":"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo","datePublished":"2024-09-09T11:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/"},"wordCount":1098,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"image":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg","keywords":["ciberseguran\u00e7a p\u00f3s-qu\u00e2ntica","criptografia p\u00f3s-qu\u00e2ntica","mundo qu\u00e2ntico"],"articleSection":["-Coluna 4","\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/","url":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/","name":"Algorithms developed by IBM are the world&#039;s first post-quantum cryptography standards - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#primaryimage"},"image":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#primaryimage"},"thumbnailUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg","datePublished":"2024-09-09T11:37:09+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#primaryimage","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2024\/08\/IBM-quantica.jpg","width":895,"height":503},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/algoritmos-desenvolvidos-pela-ibm-sao-os-primeiros-padroes-de-criptografia-pos-quantica-do-mundo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Algoritmos desenvolvidos pela IBM s\u00e3o os primeiros padr\u00f5es de criptografia p\u00f3s-qu\u00e2ntica do mundo"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/d65ed84c8883a123fe668129fd6a7ed3","name":"ABES Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b207abce016c5e2ad6bf38914af9ad16e277128bb9b06dabb05bc191f02d7fe?s=96&d=mm&r=g","caption":"Editor ABES"},"url":"https:\/\/abes.org.br\/en\/author\/editor-abes\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-18 06:08:52","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=79033"}],"version-history":[{"count":1,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79033\/revisions"}],"predecessor-version":[{"id":79035,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/79033\/revisions\/79035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media\/79034"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=79033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=79033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=79033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}