Quantum ready: A practical guide to enabling PQC with F5

F5 Ecosystem | September 03, 2025

Quantum computing is on the horizon, and it’s set to upend the cryptographic systems that protect our data, communications, and infrastructure. The time to start preparing is now. In this six-part blog series on post-quantum cryptography (PQC), cryptography thought leaders from across F5 will explain what’s at risk, what opportunities lie ahead, and what steps your organization can take today to stay secure in a post-quantum world. The future is closer than you think. Let’s get ready together.

Post-quantum cryptography (PQC) isn’t a “someday” problem—it’s already shaping how we build secure systems. Quantum computing threatens today’s encryption, and “harvest now, decrypt later” is already in play. With FIPS 203 now ratified and supported in F5 BIG-IP v17.5.1, part of the F5 Application Delivery and Security Platform, you can start deploying hybrid PQC key exchange in production.

Why PQC matters now

FIPS 203 (ML-KEM, based on Kyber) is the first U.S. National Institute of Technology (NIST) approved post-quantum algorithm for public key encryption and TLS key exchange. Without PQC, long-lived data in transit can be collected now and decrypted later. That means APIs, customer portals, and sensitive B2B exchanges are at risk even before large-scale quantum computers exist.

This makes hybrid PQC a priority today—especially for systems that protect personally identifiable information, payment details, or proprietary data.

Think of hybrid PQC like wearing both a seatbelt and an airbag. Today’s classical cryptography (like RSA or ECC) is still strong against everyday attackers, but quantum computers will eventually bypass it. By combining traditional methods with post-quantum algorithms in the same handshake, systems get two layers of protection: the proven security of what we use today, plus the quantum-resistant layer that protects against tomorrow’s threats.

From a practical standpoint, hybrid PQC means your browser, app, or API connection establishes keys using both an established algorithm (say X25519) and a PQC algorithm (like ML-KEM). If either one holds up, your data remains safe. This is important right now because we’re in a transition period: the old methods are widely deployed and efficient, while the new ones are still being tested, standardized, and rolled out. Hybrid ensures nothing breaks for compatibility, while still closing the “harvest now, decrypt later” loophole.

That’s why regulators and standards bodies like NIST recommend hybrid adoption: it’s a practical way to protect sensitive data flows today, while giving organizations time to test, tune, and prepare for a full post-quantum future.

Where to start with PQC deployment

The first step is enabling PQC on your most exposed TLS endpoints—such as login portals, web apps, and APIs—before expanding to internal services. Edge termination points, like CDNs and API gateways, are natural early targets since hybrid key exchange can be applied here without altering backend systems.

PQC Readiness diagram

How enterprises can use PQC between the client and F5 BIG-IP as well as between BIG-IP and a PQC-enabled server.

The benefits of implementing PQC with F5

Adopting PQC on your web applications isn’t only about checking a compliance box—it is about building resilience into your security architecture. With FIPS 203 (ML-KEM) now ratified and supported in BIG-IP v17.5.1, F5 customers can begin enabling hybrid PQC at the edge, where it delivers the greatest risk reduction with the least operational disruption.

One of the biggest benefits comes from centralization. By deploying PQC on the F5 platform, organizations can add quantum-resistant protection to TLS without refactoring every individual application. This means sensitive portals, APIs, and B2B exchanges gain protection against “harvest now, decrypt later” attacks through a single point of control. It also simplifies audit and compliance reporting—critical as agencies like the U.S. Cybersecurity & Infrastructure Security Agency (CISA) and standards bodies like NIST push for accelerated post-quantum readiness across both government and private industry.

Performance and compatibility also matter. Hybrid key exchange allows for the combination of an efficient classical algorithm like X25519 with ML-KEM, ensuring that traffic is still compatible with today’s browsers and clients while gaining the added quantum-safe layer. Because TLS termination already happens within BIG-IP, organizations can take advantage of its optimization capabilities to offset some of the computational overhead PQC introduces. This reduces the performance trade-off that would otherwise be borne directly by application servers.

Finally, there is a strategic benefit. Implementing PQC with F5 positions organizations as early adopters in a rapidly evolving security landscape. Customers, regulators, and partners are increasingly asking for assurance that data will remain secure against future threats. Being able to point to F5-enabled PQC in production demonstrates both technical leadership and a commitment to long-term data protection. In many industries, that can be a differentiator.

Getting ready for the quantum shift

PQC isn’t just a one-time change—it’s the start of a continuous evolution in cryptographic standards. Begin with your most exposed services, then expand. Discuss PQC readiness with partners, and plan for periodic reviews as new standards emerge.

Key takeaways:

  • Enable TLS 1.3 and test hybrid PQC in development
  • Prioritize public-facing APIs, login flows, and sensitive data paths
  • Track FIPS 204/205 for post-quantum signature support
  • Build reporting and key-rotation processes into your roadmap

Stay tuned for the final blog post in our series in which we go beyond PQC to discuss taking a holistic approach to mitigating quantum risks.

Also, be sure to check out our previous blog posts in the series:

Apps, networks, and legacy systems in the quantum crosshairs: A CISO’s POV

Understanding PQC standards and timelines

Setting the stage: Why does PQC matter?

Weighing in on the post-quantum cryptography hype

Share

About the Author

Peter Scheffler
Peter SchefflerSr Cyber Security Solutions Architect

Peter has over 30 years of experience in the software industry with nearly another 10 years before that as an amateur programmer. Peter has spent the last 20 years in the world of web application development and application security. As an independent consultant, Peter spent time developing solutions for securing network and application access for Fortune 1000 and security conscious government organizations. Peter currently works with F5 Networks as a Cyber Security Solutions Architect where he is helping protect today’s economy from cyber attacks.

More blogs by Peter Scheffler

Related Blog Posts

The everywhere attack surface: EDR in the network is no longer optional
F5 Ecosystem | 11/12/2025

The everywhere attack surface: EDR in the network is no longer optional

All endpoints can become an attacker’s entry point. That’s why your network needs true endpoint detection and response (EDR), delivered by F5 and CrowdStrike.

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift
F5 Ecosystem | 11/11/2025

F5 NGINX Gateway Fabric is a certified solution for Red Hat OpenShift

F5 collaborates with Red Hat to deliver a solution that combines the high-performance app delivery of F5 NGINX with Red Hat OpenShift’s enterprise Kubernetes capabilities.

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture
F5 Ecosystem | 10/28/2025

F5 accelerates and secures AI inference at scale with NVIDIA Cloud Partner reference architecture

F5’s inclusion within the NVIDIA Cloud Partner (NCP) reference architecture enables secure, high-performance AI infrastructure that scales efficiently to support advanced AI workloads.

F5 Silverline Mitigates Record-Breaking DDoS Attacks
F5 Ecosystem | 08/26/2021

F5 Silverline Mitigates Record-Breaking DDoS Attacks

Malicious attacks are increasing in scale and complexity, threatening to overwhelm and breach the internal resources of businesses globally. Often, these attacks combine high-volume traffic with stealthy, low-and-slow, application-targeted attack techniques, powered by either automated botnets or human-driven tools.

Volterra and the Power of the Distributed Cloud (Video)
F5 Ecosystem | 04/15/2021

Volterra and the Power of the Distributed Cloud (Video)

How can organizations fully harness the power of multi-cloud and edge computing? VPs Mark Weiner and James Feger join the DevCentral team for a video discussion on how F5 and Volterra can help.

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies
F5 Ecosystem | 12/08/2020

Phishing Attacks Soar 220% During COVID-19 Peak as Cybercriminal Opportunism Intensifies

David Warburton, author of the F5 Labs 2020 Phishing and Fraud Report, describes how fraudsters are adapting to the pandemic and maps out the trends ahead in this video, with summary comments.

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us
Quantum ready: A practical guide to enabling PQC with F5 | F5