Article Details

Scrape Timestamp (UTC): 2024-05-21 19:49:49.116

Source: https://www.theregister.com/2024/05/21/zoom_postquantum_e2ee/

Original Article Text

Click to Toggle View

Zoom adds 'post-quantum' encryption for video nattering. Guess we all have imaginary monsters to fear. Zoom has rolled out what it claims is post-quantum end-to-end encryption (E2EE) for video conferencing, saying it will make it available for Phone and Rooms "soon." This, Zoom explains, makes it "the first UCaaS company to offer a post-quantum E2EE solution for video conferencing." That's unified communications as a service. And by post-quantum, the biz means it will encrypt calls and other data so that they are resistant to being forcibly decrypted by some future super-powerful quantum computer that can undo today and yesterday's cryptography; said computers are typically always just 10 years away from being practical and powered up. The video call giant added E2EE for Zoom Meetings in 2020 and its phone service two years later. Today's upgrade uses Kyber 768, a quantum-resistant key encapsulation mechanism (KEM) to ideally help keep data safe during meetings from future qubit-based machines. To enable E2EE, all meeting participants must join from the Zoom desktop or mobile app. While those hosting a meeting on a free account can use E2EE, they will still need to verify their phone number via an SMS-delivered code. Once enabled, meeting participants will receive access to the encryption keys, which aren't stored on Zoom's servers, a move that should ensure that data traveling through servers is indecipherable. Zoom does warn that "while E2EE provides added security, some Zoom functionality is limited. Individual Zoom users should determine whether they need these features before enabling E2EE in their meetings." Kyber 768 is in the process of being standardized by America's National Institute of Standards and Technology (NIST) as the snappily titled Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203.  This algorithm was among the first encryption tools to get NIST approval to protect privacy in a post-quantum world — as we said, a hypothetical point in the future when quantum computers may be able to crack traditional encryption methods. While the technology, and general availability of quantum machines isn't there yet, the worry is that government spies are already collecting people's E2EE data for so-called "harvest now, decrypt later" surveillance programs. To help mitigate this threat, various developers and tech companies are beginning to use quantum-resistant algorithms.  For example, earlier this year Apple said it will update the cryptographic protocol used by iMessage to protect chats from quantum computers. And last fall, Signal added support for the PQXDH protocol, which establishes a post-quantum cryptographic key for encryption.

Daily Brief Summary

MISCELLANEOUS // Zoom Implements Post-Quantum Encryption to Enhance Security

Zoom has introduced post-quantum end-to-end encryption (E2EE) for its video conferencing platform, aiming to secure communications against future quantum computer threats.

This update positions Zoom as the first UCaaS provider to implement a quantum-resistant encryption solution for video communications.

The newly implemented Kyber 768 encryption algorithm is designed to protect against potential quantum computer decryption, ensuring that data remains secure through quantum-resistant encryption methods.

Users must join meetings via the Zoom desktop or mobile app to utilize E2EE, with phone number verification required for hosts on free accounts.

While enabling E2EE, users may experience limited functionality in some standard Zoom features, prompting individuals to consider their need for these features before activation.

Kyber 768 is currently under standardization by the National Institute of Standards and Technology (NIST) to become a recognized post-quantum encryption standard.

The update comes amid concerns over "harvest now, decrypt later" surveillance tactics, where encrypted data is stored until decryptable by future technology.

Other tech giants like Apple and Signal have also begun integrating quantum-resistant algorithms to safeguard communications against emerging quantum technologies.