Article Details

Scrape Timestamp (UTC): 2024-05-22 04:50:42.063

Source: https://thehackernews.com/2024/05/zoom-adopts-nist-approved-post-quantum.html

Original Article Text

Click to Toggle View

Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings. Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE) for Zoom Meetings, with support for Zoom Phone and Zoom Rooms coming in the future. "As adversarial threats become more sophisticated, so does the need to safeguard user data," the company said in a statement. "With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data." Zoom's post-quantum E2EE uses Kyber-768, which aims at security roughly equivalent to AES-192. Kyber was chosen by the U.S. Department of Commerce's National Institute of Standards and Technology (NIST) in July 2022 as the quantum-resistant cryptographic algorithm for general encryption. However, for post-quantum E2EE to be enabled by default, it requires all meeting participants to be on Zoom desktop or mobile app version 6.0.10 or higher. In the event some of the participants don't meet this minimum version requirement, standard E2EE will be used. While quantum computers are still in their experimental stages, the threat posed by such computers in the coming years is that they could trivially crack classical mathematical problems that are considered computationally intensive, thus making cryptanalysis much easier. Compounding this aspect is a type of attack called harvest now, decrypt later (HNDL), or retrospective decryption, where sophisticated threat actors steal and store encrypted network traffic now, with an intent to decrypt it later when quantum computers become more advanced. Post-quantum cryptography is designed to thwart such risks, prompting several companies such as Amazon Web Services (AWS), Apple, Cloudflare, Google, HP, Signal, and Tuta to integrate the new standard into their products. Earlier this February, the Linux Foundation announced the launch of a Post-Quantum Cryptography Alliance (PQCA) that seeks to address cryptographic security challenges posed by quantum computing. While quantum computers strong enough to break cryptography are currently only theoretical, government-backed efforts are already underway to help organizations transition to quantum-resistant cryptography. "For organizations that support critical infrastructures or are depended upon by large sections of society, the need to migrate is particularly urgent," HP Wolf Security noted earlier this year.

Daily Brief Summary

MISCELLANEOUS // Zoom Integrates NIST-Approved Post-Quantum Encryption

Zoom has introduced post-quantum end-to-end encryption (E2EE) to enhance meeting security.

The new encryption standard uses Kyber-768 algorithm, selected by NIST for its quantum resistance.

Post-quantum E2EE will only default when all users are on Zoom version 6.0.10 or newer; otherwise, standard E2EE applies.

The upgrade aligns with growing concerns over quantum computing's potential to break traditional cryptography.

Industry leaders like AWS, Apple, and Google are also adopting quantum-resistant standards.

The move is particularly vital for entities managing critical infrastructure, as emphasized by HP Wolf Security.

The Linux Foundation recently launched a Post-Quantum Cryptography Alliance to tackle quantum-related cryptographic security challenges.