(3 votes, average: 5.00 out of 5)
Loading...
In a significant leap towards bolstering digital security, Google Chrome has introduced support for a hybrid post-quantum cryptographic algorithm in its latest release, version 116, released on August 15.
An announcement made by Devon O’Brien from the Chromium Project blog post, made live on August 10, signifies this adoption as – “a paramount step in protecting organizational data from quantum computing-based threats while countering present cryptographic challenges.”
As of December 2022, President Joe Biden signed H.R.7535, The Quantum Computing Cybersecurity Preparedness Act, which requires US government agencies to begin moving toward quantum resilient cryptography.
Apart from this, “n” number of multinational corporations, like AWS, IBM, etc., have already incorporated quantum computing algorithms into their systems. But do remember – “Using quantum computers on a large scale can be advantageous; however, it’s the case if used by responsible individuals, not malicious actors.”
Google has been diligently testing new PQC (Post-Quantum Cryptography) algorithms to prepare for a quantum-secure future, and with the official launch of Chrome version 116, it has somewhat achieved it.
The browser (Chrome 116) supports a quantum-resistant algorithm – X25519Kyber768, the first quantum computing hybrid key agreement algorithm available for general purposes.
X25519Kyber768 operates as a hybrid mechanism blending the outputs of two cryptographic algorithms to construct the session key for encrypting most of the TLS connection. Those two algorithms are:
A client generates a symmetric secret (X25519) for encrypting data in the session. The server’s public key encapsulates the secret using the Kyber-768 KEM encapsulation algorithm. Upon receiving the message, the server employs its private key with a decapsulation algorithm to decrypt the shared key data.
Note: For now, the change is only available on Chrome and Google servers over both TCP and QUIC to ensure compatibility with the ecosystem. It is also important to note that Chrome may use this updated key agreement when connecting to third-party server operators, like Cloudflare, as they add support.
Before we answer the query mentioned above, it would be better to understand what a quantum computer is. Quantum computers are supercomputers that currently exist only in laboratory environments and use the quantum mechanics principle of superposition to process information differently from classical/modern computers.
Modern computers process bits (1s or 0s) individually, whereas Quantum computers process them differently, using quantum bits (called “qubits”), which can represent 1s and 0s simultaneously, exponentially increasing processing power and shrinking processing times.
It’s currently believed that quantum computers capable of breaking modern classical cryptography won’t become publicly available for another 15 or even 30 years from now. However, it’s crucial to start protecting data traffic today due to the vulnerability of certain cryptography techniques to a specific type of attack known as Harvest Now, Decrypt Later. In this attack, data is collected and stored today, to be decrypted later when cryptanalysis has improved.
In Transport Layer Security (TLS), the encryption algorithms that safeguard the data in transit are deemed secure against quantum cryptanalysis. However, the creation of symmetric keys is not secure against it. As a result, in Chrome, updating TLS to utilize quantum-resistant session keys as soon as possible would enable us to safeguard user network traffic against future quantum cryptanalysis.
In short, “Quantum-resistant encryption or post-quantum cryptography is our best bet against attacks from upcoming quantum computers.”
Quantum-resistant algorithms are a recent development and their security is yet to be thoroughly tested. Therefore, it is not advisable to entirely replace our current cryptographic algorithms with them. It is still possible that an attacker might find a way to break the algorithm we have chosen, either on a conventional or a quantum computer.
Hence, a hybrid approach combining both post-quantum and conventional algorithms is necessary to ensure maximum security.
There are two ways to verify whether your Chrome browser (version) is equipped with post-quantum hybrid algorithm security or not. Those two ways are:
Follow the steps mentioned below to verify the same:
You can use Chrome developer tools to inspect which encryption algorithms Chrome is utilizing for a particular website connection. To accomplish the same, follow the steps mentioned below:
Enabling client support of Kyber in Chrome 116 is a straightforward process comprising only seven steps. If you want to enable client support of Kyber in Google Chrome 116, follow the steps mentioned below:
Yes, there are! When using Kyber768, an additional kilobyte of data is added to the TLS ClientHello message due to the inclusion of the Kyber-encapsulated key material.
The tests conducted using CECPQ2 showed that most TLS implementations are able to handle this increase in size. However, in some cases, TLS middleboxes may fail if they have hardcoded restrictions on message size.
To help enterprises cope with network appliance incompatibility issues resulting from the rollout of new algorithms, administrators can temporarily disable Kyber768 in Chrome by utilizing the PostQuantumKeyAgreementEnabled enterprise policy, which is available starting in Chrome 116.
But, doing this will be just a temporary fix, and therefore, administrators should work with the affected products’ vendors to ensure that any bugs causing incompatibilities are promptly resolved.
As a final consideration for deployment, it should be noted that both the Kyber768 and Kyber specifications are currently drafts and may undergo changes prior to finalization, causing changes to Chrome’s implementation.
Deploying post-quantum cryptography is crucial and should occur as soon as possible. This is not only necessary to prepare us for the advent of large-scale universal quantum computers but also to ensure that data currently encrypted with standard algorithms remains secure against future decryption attempts.