
Imagine This…
It’s 2030. Quantum computers are no longer a theory—they’re real, fast, and scary. The encryption we use today to protect our bank logins, emails, and confidential data? It’s no longer safe. Why? Because quantum computers can break it. That’s why Post-Quantum Cryptography in RHEL 10 is a big deal. Red Hat has stepped in early to help Linux system administrators future-proof their infrastructure.
Now imagine this: You’re a system admin running a fleet of Linux servers. You wish you had prepared in advance.
What is Post-Quantum Cryptography?
Cryptography is how we protect data—it’s what keeps your messages, passwords, and files safe from hackers.
But most of our current encryption (like RSA, ECC) was designed before quantum computers existed.
Post-Quantum Cryptography (PQC) is a new class of cryptographic algorithms built to be secure even if quantum computers become mainstream.
In short:
✅ RSA and ECC = Safe today, not safe tomorrow.
✅ PQC = Safe today and tomorrow.
Key Post-Quantum Cryptography (PQC) Features in RHEL 10
1. OpenSSL 3.2 with PQC Support
RHEL 10 ships with OpenSSL 3.2, introducing experimental support for hybrid encryption schemes.
🔒 Hybrid Encryption = Post-Quantum Algorithm + Traditional Algorithm
This approach ensures backward compatibility while allowing early adoption of quantum-resistant methods.
2. ML-KEM Support Across TLS and SSH
RHEL 10 integrates ML-KEM (Module-Lattice-based Key Encapsulation Mechanism) — a NIST-approved post-quantum algorithm — across various secure communication protocols:
- 🔐 Transport Layer Security (TLS): Available via OpenSSL, GnuTLS, and NSS
- 🔑 Secure Shell (SSH): Supported in OpenSSH
These implementations enable hybrid key exchanges, combining classical cryptography with quantum-resistant techniques for enhanced security.
3. liboqs Integration via Open Quantum Safe Project
RHEL 10 is exploring integration with the Open Quantum Safe (OQS) project — an open-source initiative that offers tools and libraries for post-quantum cryptography.
- Includes support for liboqs, enabling access to a wide range of NIST-recognized PQC algorithms like Kyber, Dilithium, and more.
4. Experimental SSH & TLS Configurations
PQC-enabled key exchanges can now be tested in:
- 🔐 OpenSSH
- 🔐 TLS libraries (OpenSSL, GnuTLS, NSS)
🧪 These configurations are currently experimental, making them ideal for testing and research labs, but not yet recommended for production use.
5. Future-Ready Kernel and Tooling
RHEL 10 introduces a modernized kernel and userland environment, optimized to support the upcoming evolution of cryptographic standards.
Red Hat is preparing the OS for long-term compatibility with future PQC implementations, standard updates, and production-level security tools.
How to Experiment with PQC in RHEL 10
Note: These features are experimental and should not be used in production environments.
Step 1: Verify OpenSSL Version
Ensure you’re using OpenSSL 3.2 or later:
openssl version
Step 2: List Available Key Exchange Algorithms
Check for available hybrid algorithms:
openssl list -public-key-algorithms
Look for entries like p256_kyber768 indicating hybrid support.
Step 3: Configure SSH for PQC
Edit your SSH configuration to include PQC algorithms:
sudo nano /etc/ssh/sshd_config
Add or modify the KexAlgorithms line:
KexAlgorithms x25519-kyber512-sha256
Restart the SSH service:
sudo systemctl restart sshd
Why Does This Matter?
You don’t need a quantum computer to start thinking about quantum security.
Attackers can store encrypted data today and decrypt it years later when they have the tools. This is called Harvest Now, Decrypt Later — and it’s real.
RHEL 10’s early support lets enterprises and developers:
✔️ Test and integrate PQC in a stable environment
✔️ Begin migrating long-term data security strategies
✔️ Be proactive — not reactive — about cybersecurity
A Quick Glossary
- RSA/ECC: Traditional cryptographic algorithms.
- Quantum Computer: A new type of computer that can solve complex math incredibly fast.
- Hybrid Encryption: Combines classic and quantum-safe methods for smoother transition.
- NIST: U.S. body standardizing PQC algorithms after years of testing.
- liboqs: Open-source library for PQC experimentation.
Internal Links
- Introduction to RHEL 10: What’s New and What to Expect
- Initial Setup: Post-Installation Things To Do in RHEL 10
- How to Install RHEL 10 for Free (Developer Edition)
Outbound Links
Final Thoughts
Post-Quantum Cryptography sounds like science fiction — but it’s becoming science fact fast.
RHEL 10 gives you the tools to explore, test, and prepare your infrastructure for that future.
You don’t need to be a cryptography expert to start — just curious.
🔗 Read it now: ghanshammahajan.com/exploring-post-quantum-cryptography-rhel-10