TLS 1.3 is NOT Quantum Safe

TLS 1.3 was released in August 2018. It is considered the strongest and safest version of TLS, offering enhanced security through the removal of old, weak cryptographic features and a faster, simplified handshake process compared to previous versions like TLS 1.2. But it is NOT safe from Quantum cracking.

ECDH is NOT Quantum Safe

No, TLS 1.3 is not inherently quantum-safe because it relies on Elliptic Curve Diffie-Hellman (ECDH), which can be broken by quantum computers using Shor’s algorithm. However, the internet is transitioning to Post-Quantum TLS (PQTLS), which uses hybrid approaches to incorporate new, quantum-resistant algorithms with the established TLS 1.3 framework. This transition aims to protect against future quantum attacks by migrating towards algorithms standardized by NIST, such as ML-KEM, while maintaining security for current classical computers. 

Why TLS 1.3 is not quantum-safe:

How the internet is becoming quantum-safe with TLS 1.3:

  • Post-Quantum TLS (PQTLS): This is the ongoing effort to update TLS, with TLS 1.3 serving as the starting point. 
  • Hybrid Key Exchange: The new approach involves a hybrid strategy, where both classical (e.g., ECDH) and post-quantum algorithms are used together. 
  • NIST Standardization: The US National Institute of Standards and Technology (NIST) has been working to standardize post-quantum algorithms, such as ML-KEM, which are being incorporated into PQTLS. 
  • Industry Adoption: Companies and operating systems are already adopting these PQTLS standards, implementing hybrid key exchange and advertising support for post-quantum algorithms. 

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *