F5 extends NIST-compliant PQC cipher support

F5 ADSP | March 11, 2026

Quantum computing used to feel like something out of a sci-fi movie—but now, it's reshaping the world of cybersecurity in real and urgent ways. It’s moving quickly from theoretical to practical, and with it comes both opportunity and risk.

For security leaders, the biggest concern is simple: The cryptography we rely on today won’t necessarily stand up to tomorrow’s quantum capable adversaries.

And attackers know it.

Many are already harvesting encrypted data now with the intent to decrypt it later, once quantum machines reach the scale needed to break today’s public key algorithms. That “harvest now, decrypt later” threat makes quantum safe cryptography a priority today, not five years from now.

By combining PQC hybrid ciphers with quantum secure VPN tunneling, organizations can protect both apps and network traffic without needing to rearchitect or disrupt their systems.

To help organizations confidently move toward the future, F5 has added support for two hybrid post-quantum cryptography (PQC) ciphers in the latest F5 BIG-IP release: SecP256r1ML-KEM-768 and SecP384r1ML-KEM-1024.

Both algorithms are built on parameters approved by the U.S. National Institute of Standards and Technology (NIST) under FIPS 203 and provide a straightforward, standards-aligned way to start adopting quantum resistant protections—without rearchitecting apps or sacrificing performance.

But quantum security doesn’t stop there: As part of this release, F5 is further enabling cryptographic modernization with quantum secure VPN tunneling capabilities, giving organizations the tools they need to address encrypted network traffic risks in a post-quantum world.

Why PQC matters now

Most of the cryptography securing digital infrastructure—like Rivest-Shamir-Adleman (RSA) and elliptic curve cryptography (ECC), and other public key systems—was designed for classical computing. Quantum computers change the math dramatically. At sufficient scale, they could break today’s public key crypto far faster than current machines ever could.

That presents immediate challenges for security-critical environments:

  • Long-lived or high-value data, like medical records or trade secrets, may already be vulnerable. Even if it’s encrypted today, attackers could decrypt it in the future.
  • Regulated industries face compliance pressure. Many government and industry mandates are already pushing organizations toward quantum safe planning.
  • Modernization isn’t optional. Organizations need encryption that’s strong enough to protect against today’s threats—and agile enough to evolve with future standards and challenges.

This is where hybrid PQC becomes the practical bridge.

Where hybrid ciphers fit into the transition

Going straight to new PQC algorithms across an entire environment isn’t realistic yet. Standards are maturing, interoperability is evolving, and most organizations can’t afford disruption to apps, devices, or architectures.

Hybrid PQC solves that.

By combining proven, traditional cryptography, like ECC, with a new quantum-resistant algorithm, like Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM), hybrid ciphers deliver security for both today’s threats and tomorrow’s quantum-enabled ones. You get two layers of key establishment backed by NIST with SecP256r1ML-KEM-768 and SecP384r1ML-KEM-1024. In this case:

  • ECC for compatibility and continuity (SecP256r1 and SecP384r1)
  • ML-KEM for long-term quantum resilience (ML-KEM-768 and ML-KEM-1024)

If one layer is compromised, the other still protects the key exchange. Think of it this way: Hybrid PQC is like wearing a seatbelt and having an airbag. Taking the hybrid PQC route is a highly practical, lower risk way to begin the transition without leaping into unchartered waters. It brings quantum-ready security without disruptive changes.

What F5’s new hybrid PQC support delivers

F5’s approach to the quantum era focuses on real-world deployment—not theoretical readiness. By integrating NIST-approved hybrid PQC ciphers directly into BIG-IP, a critical component of the F5 Application Delivery and Security Platform (ADSP), customers can start adopting quantum safe encryption with minimal friction.

Here’s what stands out:

  • Strengthened protection against emerging quantum threats. These hybrid ciphers help close the gap created by “harvest now, decrypt later” attacks. Security teams can strengthen cryptographic posture years before quantum computing becomes operationally capable.
  • Compliance built into the platform. Because these hybrid ciphers align with NIST PQC standards and meet FIPS 203 requirements, they support organizations navigating increasing regulatory scrutiny.
  • Seamless deployment with enterprise‑grade performance. Hybrid PQC is implemented directly within F5 ADSP, so teams can take advantage of it without re‑architecting apps or systems while maintaining the reliable, high-performance experience they expect from BIG-IP.

The latest BIG-IP release takes app security further by extending post-quantum protections to VPN tunnels. By combining PQC hybrid ciphers with quantum secure VPN tunneling, organizations can protect both apps and network traffic without needing to rearchitect or disrupt their systems. This integrated approach makes it easier for enterprises to adopt quantum-ready measures across encrypted communications and critical infrastructure, while keeping defenses strong against quantum-fueled threats.

Why federal agencies especially benefit

Every organization should prepare for quantum threats, but federal environments face uniquely urgent pressure. Classified and high-value mission data have long lifespans—exactly the kind of information nation-states and other adversaries target for future decryption. Federal directives with defined PQC timelines only add to the urgency. By 2030, U.S. federal agencies must migrate to PQC, and by 2035 national security systems must be fully quantum resistant.

F5’s hybrid PQC support of SecP256r1ML-KEM-768 and SecP384r1ML-KEM-1024 gives agencies a standards-aligned, FIPS-compliant way to start that transition immediately—without jeopardizing uptime or disrupting critical systems.

Built for long-term crypto agility

Quantum readiness isn’t a one-time upgrade—it’s a multi-year journey. As algorithms and standards continue to change, F5 designed BIG-IP with crypto agility in mind. By staying closely aligned with NIST, F5 ensures organizations can adapt to the shifting landscape without costly migrations or added operational risk.

Moving forward with confidence

The quantum era is arriving faster than many expected. With support for the latest NIST-compliant hybrid PQC ciphers and quantum secure VPN tunneling, F5 offers a practical, high-performance path to quantum-resistant cryptography.

Curious to know more about what the quantum era means for security professionals? Watch this on-demand webinar featuring insights from F5 experts and Forrester.

Share

About the Author

Rachael Shah
Rachael ShahSenior Product Marketing Manager | F5

More blogs by Rachael Shah

Related Blog Posts

A sneak peek into F5 BIG-IP v21.1: AI security, PQC, and software enhancements
F5 ADSP | 03/11/2026

A sneak peek into F5 BIG-IP v21.1: AI security, PQC, and software enhancements

Learn how F5’s BIG-IP v21.1 delivers PQC-readiness, AI workload security, modern API and protocol protection, and BIG-IP TMOS software modernization.

The hidden cost of unmanaged AI infrastructure
F5 ADSP | 01/20/2026

The hidden cost of unmanaged AI infrastructure

AI platforms don’t lose value because of models. They lose value because of instability. See how intelligent traffic management improves token throughput while protecting expensive GPU infrastructure.

F5 secures today’s modern and AI applications
F5 ADSP | 12/22/2025

F5 secures today’s modern and AI applications

The F5 Application Delivery and Security Platform (ADSP) combines security with flexibility to deliver and protect any app and API and now any AI model or agent anywhere. F5 ADSP provides robust WAAP protection to defend against application-level threats, while F5 AI Guardrails secures AI interactions by enforcing controls against model and agent specific risks.

Govern your AI present and anticipate your AI future
F5 ADSP | 12/18/2025

Govern your AI present and anticipate your AI future

Learn from our field CISO, Chuck Herrin, how to prepare for the new challenge of securing AI models and agents.

F5 recognized as one of the Emerging Visionaries in the Emerging Market Quadrant of the 2025 Gartner® Innovation Guide for Generative AI Engineering
F5 ADSP | 11/25/2025

F5 recognized as one of the Emerging Visionaries in the Emerging Market Quadrant of the 2025 Gartner® Innovation Guide for Generative AI Engineering

We’re excited to share that F5 has been recognized in 2025 Gartner Emerging Market Quadrant(eMQ) for Generative AI Engineering.

Self-Hosting vs. Models-as-a-Service: The Runtime Security Tradeoff
F5 ADSP | 05/01/2025

Self-Hosting vs. Models-as-a-Service: The Runtime Security Tradeoff

As GenAI systems continue to move from experimental pilots to enterprise-wide deployments, one architectural choice carries significant weight: how will your organization deploy runtime-based capabilities?

Deliver and Secure Every App
F5 application delivery and security solutions are built to ensure that every app and API deployed anywhere is fast, available, and secure. Learn how we can partner to deliver exceptional experiences every time.
Connect With Us