Red Hat Enterprise Linux 10
Post-quantum cryptography for Red Hat Enterprise Linux
Red Hat® Enterprise Linux® 10 is leading the way by including National Institute of Standards and Technology (NIST)-approved quantum-resistant algorithms, helping you to begin preparations for threats from quantum computers.
Post-quantum cryptography in Red Hat Enterprise Linux 10 is now available.
Highlights
The situation
Quantum computing is an emerging technology that in the near future could break or compromise current widespread cryptography in a matter of seconds.1
The early predictions
Asymmetric cryptography underlies most global cryptography. By 2029, advances in quantum computing could make asymmetric cryptography unsafe and by 2034 fully breakable.2
The current threat
While quantum computers aren’t widely available yet, bad actors can steal encrypted data now, hold onto it, and break the encryption later with more powerful hardware. This form of attack is called ‘harvest now; decrypt later’, and it’s already happening today.3
Red Hat Enterprise Linux and post-quantum cryptography


The rise of post-quantum cryptography
Post-quantum cryptography (PQC) refers to encryption algorithms resistant to attacks from quantum computers. In 2024, NIST released the first set of encryption standards and encouraged IT professionals to begin transitioning to these new standards as soon as possible.

Red Hat Enterprise Linux is leading the way
Red Hat Enterprise Linux 10 includes the first installment of PQC algorithms, based on NIST-approved standards, that enable key-exchange, encryption, and signing. This will help you start taking the steps required to protect you from harvest now; decrypt later attacks. It will also help to prepare you for complying with PQC mandates in the future.

Preparing for the future
Organizations will need to support new cryptographic capabilities if they want to keep their sensitive data protected against attacks. Governments and compliance authorities are already aware of the threat quantum computers pose to current cryptography standards—and Red Hat is no different.
For years, Red Hat has been preparing for PQC challenges and planning to incorporate support into Red Hat Enterprise Linux. With Red Hat Enterprise Linux 10, you can begin testing NIST-approved, quantum-resistant algorithms with your organization to start protecting your data and preparing to meet future regulatory requirements.
Explore more resources
Blog
Post-quantum cryptography in Red Hat Enterprise Linux 10
E-book
Solve business and IT challenges with Red Hat Enterprise Linux 10
Datasheet
What is new in Red Hat Enterprise Linux 10 and beyond
Continue exploring Red Hat Enterprise Linux 10
Lal, Anurag. “How Businesses Can Prepare For Quantum Threats With Post-Quantum Cryptography.” Forbes, 14 Jan. 2025.
Gartner. “Begin Transitioning to Post-Quantum Cryptography Now.” Horvath, Mark, 30 Sept. 2024. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and are used herein with permission. All rights reserved.
Amos, Zac. “‘Harvest now, decrypt later’: Why hackers are waiting for quantum computing.” VentureBeat, 21 Sept. 2024.