Post quantum cryptography
Quantum computers of a sufficient size will threaten the very basis of cryptography, rendering digital signatures and cryptographic protocols like TLS (HTTPS) insecure.
The LinuxONE 5 system uses methods inside its hardware and firmware to protect customer hardware investments against potential quantum threats. Starting with Crypto Express 7S, adapters in CCA or EP11 mode provide first versions of post quantum cryptographic algorithms accessible to Linux® software.
On LinuxONE 5, the Crypto Express 8S adapter is engineered to enable your post quantum journey by providing access to post quantum cryptography methods standardized by NIST.