Post quantum cryptography
Quantum computers of a sufficient size will threaten the very basis of cryptography, rendering digital signatures and cryptographic protocols like TLS (HTTPS) insecure.
While nobody knows when a sufficiently large quantum computer will exist, their impact
would be immense, and the threat of harvesting encrypted data today for later decryption is very
real. To be prepared today, IBM already utilizes post
quantum cryptography (PQC) with the LinuxONE systems.
The LinuxONE 5 system uses methods inside its hardware and firmware to protect customer hardware investments against potential quantum threats. Starting with Crypto Express 7S, adapters in CCA or EP11 mode provide first versions of post quantum cryptographic algorithms accessible to Linux software.
On LinuxONE 5, the Crypto Express 8S adapter is engineered to enable your post quantum journey by providing access to post quantum cryptography methods standardized by NIST.