Mainframe is on the precipice of a new age, with quantum computing advancements being a key driver of innovation. While quantum computing offers groundbreaking potential, mainframe security risks are a growing concern. To lower risk across critical mainframe systems, mainframers must build cryptography skills and adopt quantum-resistant solutions.
To support our community in this new challenge, SHARE will be hosting a focused two-day workshop with actionable strategies to prepare for the post-quantum era: SHARE Blueprint. Happening on Aug. 20 and 21 — immediately after SHARE Pittsburgh — the event will bring industry experts together to explore the technology and policy updates that our community must address to build quantum-resistant mainframes. At the event’s end, all attendees will walk away with an outlined plan of approach to take back to their organizations.
After reading this article, learn more about post-quantum cryptography (PQC) and prepare for Blueprint by attending one or all of the following webinars:
Quantum Computing Basics
Currently, classical computers work in finite states of 1s and 0s. This method of computing has been the driving force of the world’s economy for the past 50 years; however, a new method of computing is on the horizon: quantum computing, which will break the current paradigm of classical computing. Quantum computing uses the concept of a qubit to perform calculations; this is a bit that can exist in a state of 1 and 0 simultaneously via superposition, enabling exponentially faster solutions for tasks like factoring large numbers. Quantum computing promises to unlock solutions for complex challenges across medicine, economics, and chemical engineering, revolutionizing industries that have hit the ceiling of classical limits.
Using this new technology means calculations that would take an infeasible amount of time on a classical computer could be done at a fraction of the time. With parallelism, quantum computers could lead to breakthroughs in physics, chemistry, medicine, and other industries — but it’s not all good news.
Mainframe and Asymmetric Encryption: New Risks
As with many new technologies, quantum computing could trigger a Pandora’s box. While holding great promise for the advancement of our society, there is an underlying risk to a core technology upon which our world economy is built: asymmetric encryption. Our current asymmetric encryption relies on number theory regarding how two prime numbers can be used to create a unique key.
While classical computers are unable to break this type of encryption within a reasonable timeframe, a sufficiently powerful quantum computer — which some experts believe will be available by the year 2030 — could break our current asymmetric encryption methods in a few hours. This could impact all transmissions, even those protected by network security protocols such as TLS 1.3 or the latest version of IPsec VPNs.
Preparing for the Mainframe Quantum Revolution
The mainframe, which powers core data processing for most industries (including almost 90% of global credit card transactions), must stay ahead of quantum risks. In the financial industry, threats like “Harvest Now, Decrypt Later” (HNDL) — where attackers steal encrypted data today for future quantum decryption — demand action. As mainframers, we’ve been on this security for years, with safeguarding customer information as our top priority. Adopting post-quantum cryptography — like National Institute of Standards and Technology (NIST)-standardized algorithms on IBM z16/z17 — is essential to safeguard user data.
As the longest-running user group in the z/OS space, SHARE has closely monitored PQC “Y2Q” (Year 2 Quantum) threat — often described as computing’s next “Y2K” moment. While scientific leaders offer varying perspectives on exactly when a quantum computer will possess the power to break current encryption, industry and government timelines are already tightening.
Google is urging industries to adopt PQC standards by 2029, while NIST plans to begin deprecating asymmetric algorithms like RSA-2048 and ECC-256 by the end of 2030. Additionally, the National Cyber Security Center has established a migration window between 2028 and 2035. Although these timelines differ, they all align on one fact: Y2Q represents an existential threat to our current computational ecosystem. This urgency made PQC the clear choice for SHARE’s first Blueprint event, as the topic demands immediate focus from our user base.
While Y2Q is an industry-wide challenge that threatens the critical backbone of the global economy, the mainframe community must take the lead. From finance and the public sector to ecommerce and telecom, every sector reliant on mainframe security needs to address quantum risks now. SHARE Blueprint is your chance to collaborate, learn, and act. Plus, you’ll leave with an outlined cryptography plan to start securing your mainframe.
The event delivers expert insights alongside diverse industry perspectives through interactive workshops. Unlike standard lectures, SHARE Blueprint will engage attendees as we all put our heads together to solve this pressing problem. The event has two tracks, Governance and Technology, and will include:
- Interactive tabletop exercises for collaborative problem-solving in quantum-resistant mainframe security.
- Real-time discussions on tackling Y2Q challenges as a mainframe user community.
As a co-chair for SHARE Blueprint, I’m excited to collaborate with the mainframe community to tackle this Y2Q challenge. Register today to secure your spot and join the conversation on future-proofing mainframes against quantum threats.