
While DNS makes the Internet approachable and usable for people, cryptography makes it secure.
Without trustworthy encryption, logging on to remote computers, engaging in online banking and shopping, and exchanging confidential personal communications would be difficult, to say nothing of implications for national security-related systems. In this blog, we are going to stray from our DNS roots to talk about important changes happening in cryptography.
Historically, Internet encryption has relied on a number of well-proven cryptographic algorithms, most notably RSA (Rivest–Shamir–Adleman)1, Diffie-Helman (DH)2, and Elliptic Curve cryptography (ECC)3. While those algorithms are robust against publicly-known attacks by traditional computers, recent advances in quantum computing4 have surfaced concerns that quantum-enabled attacks (such as Schor’s algorithm)5 will soon be able to crack some mainstream cryptographic algorithms. If/when this happens, sensitive network traffic may become visible to unintended 3rd parties.
The amount of time left until large-scale fault-tolerant quantum computers become generally available is uncertain. Some knowledgeable experts predict that we’ve only got three to five years left6
– virtually no time at all when it comes to rolling out a replacement for widely used cryptographic algorithms. Many industry leaders are very hard at work on commercializing quantum computing, including:
Moreover, even BEFORE large-scale fault-tolerant quantum computers become available, nation-state adversaries may be “vacuuming up” all the network traffic they can intercept, even if it is encrypted, squirreling it away until the future date when it CAN be successfully decrypted (what some call “Harvest Now, Decrypt Later.”)22.
So, the push to decrypt quantum computing is “half the story.” Let’s now talk about the other half, post quantum cryptography (PQC).
For nearly a decade, the National Institute of Standards and Technology (NIST) has been hard at work standardizing new cryptographic algorithms that will be secure even when practical quantum computing systems have been realized23. The new algorithms rely heavily on “Module Learning with Errors,” a problem from advanced mathematics24 that most non-mathematicians have probably never even heard of. It is thus perhaps rather appropriate that the names of the new NIST-approved PQC algorithms draw heavily from science fiction-related themes. I quote:25
The Internet Engineering Task Force (IETF) has a (recently expired) draft RFC that’s relevant, see “Kyber Post-Quantum KEM”26
What’s amazing is that Post Quantum Cryptographic algorithms have been deployed and are already in widespread use. YOU may even be using PQC algorithms on your computer right now! To understand how that can be the case, start with a cool network statistical service offered by Cloudflare called “Cloudflare Radar.”27
Looking at United States https request traffic seen by Cloudflare for the 24 hours ending Friday, September 13th, 2024, we see:

Up to 28% of the data seen by Cloudflare Radar is ALREADY using PQC! Amazing! How’s that even possible?
about:config in the Firefox browser address bar and search for kyber security.tls.enable_kyber setting to set it to true
network.http.http3.enable_kyber

At least in the case of Chrome, Firefox, Brave, and Opera they’re all using a hybrid algorithm called “X25519Kyber768Draft00.”39 Want to check/confirm? Visit
https://pq.cloudflareresearch.com/
– it will conveniently confirm if you’re using that protocol:

If you’re using X25519Kyber768Draft00 and there’s a problem with Kyber, traditional X25519 crypto protection will still “have you covered.” If there’s a problem with the X25519 crypto, Kyber’s “got your six.” We think that’s a comforting belt-and-suspenders deployment option!
For example, literally as this was being written on September 14, 2024, Google announced another shift in PQC algorithms, as described in “A new path for Kyber on the web.”40 That article explained that Google will be moving from the currently supported version of Kyber to a subtly different (now-standardized) version of ML-KEM with a different “codepoint,” effective with Chrome 131 (most people using the production version of Chrome are on 128). This should be effectively unnoticeable to users, but is still worth calling out as a sign that this is a very dynamic time!
Without the security provided by cryptography, the Internet would not be a viable platform for finance, business, research, or many other activities people rely on the Internet to provide. Quantum computers challenge the status quo regarding current cryptographic algorithms, but help is here with the creation and deployment of post-quantum cryptographic algorithms. It’s possible you may already be benefiting from them with additional improvements to come.
1 https://en.wikipedia.org/wiki/RSA_(cryptosystem)
2 https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange
3 https://en.wikipedia.org/wiki/Elliptic-curve_cryptography
4 Short introduction: https://mitsloan.mit.edu/ideas-made-to-matter/quantum-computing-what-leaders-need-to-know-now Book length (389 pages): “Quantum Computing: A Gentle Introduction,”
https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262526670
5 https://en.wikipedia.org/wiki/Shor%27s_algorithm
7 https://aws.amazon.com/braket/
11 https://www.ibm.com/quantum
12 https://www.intel.com/content/www/us/en/research/quantum-computing.html
15 https://quantum.microsoft.com/
17 https://www.psiquantum.com/
18 https://www.quantinuum.com/
21 https://terraquantum.swiss/
22 https://en.wikipedia.org/wiki/Harvest_now,_decrypt_later
23 https://csrc.nist.gov/projects/post-quantum-cryptography
24 The mathematically inclined may find “On The Hardness Of The Module Learning With Errors Problem,” to be interesting, see https://langloi227.users.greyc.fr/webpage/20230602_slides.pdf
25 https://csrc.nist.gov/News/2024/postquantum-cryptography-fips-approved
https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards says that “[…] when the draft FIPS 206 standard built around FALCON is released, the algorithm will be dubbed FN-DSA, short for FFT (fast-Fourier transform) over NTRU-Lattice-Based Digital Signature Algorithm.”
26 https://datatracker.ietf.org/doc/html/draft-cfrg-schwabe-kyber
27 https://radar.cloudflare.com/
28 https://blog.cloudflare.com/post-quantum-to-origins/
29 “Advancing Our Amazing Bet on Asymmetric Cryptography,” May 23rd, 2024
https://blog.chromium.org/2024/05/advancing-our-amazing-bet-on-asymmetric.html
and “Post-Quantum Cryptography: Standards and Progress,” August 13th, 2024
https://security.googleblog.com/2024/08/post-quantum-cryptography-standards.html
30 Some software which did apparently have some issues with the PQC rollout can be seen at https://tldr.fail/
34 https://www.apple.com/safari/
35 https://www.torproject.org/
36 https://security.apple.com/blog/imessage-pq3/
See also https://cloudsecurityalliance.org/blog/2024/05/17/apple-s-new-imessage-signal-and-post-quantum-cryptography
37 https://signal.org/blog/pqxdh/
39 https://www.ietf.org/archive/id/draft-ietf-tls-hybrid-design-10.txt
40 https://security.googleblog.com/2024/09/a-new-path-for-kyber-on-web.html