On July 7, 2016, Google Security Blog published a post on Google’s current experiments with post-quantum cryptography. The firm is currently trialing a post-quantum key-exchange algorithm on a small number of connections between Google servers and Chrome, notably using the experimental Google Chrome version, Canary, which is designed for developers and early adopters. The algorithm is added on top of the existing elliptic-curve key-exchange algorithm (ECC) typically used. In case the post-quantum solution does not work, the security remains intact using ECC. The algorithm is based on one developed by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe, called New Hope, which is an instantiation of Peikert's ring-learning-with-errors-based (Ring-LWE) key-exchange protocol. The idea is to integrate it into OpenSSL to provide post-quantum security for TLS.
To find out more about subscribing: