{"id":24006,"date":"2024-02-28T11:02:26","date_gmt":"2024-02-28T19:02:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17736\/"},"modified":"2024-02-28T11:02:26","modified_gmt":"2024-02-28T19:02:26","slug":"news-17736","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17736\/","title":{"rendered":"Apple\u2019s iMessage gains industry-leading quantum security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/08\/23\/11\/microsoft-quantum-computer-source-ms-quantum-100832328-small-100945095-small.jpg\"\/><\/p>\n<p>Apple is preparing for future threats to iMessage by introducing upgraded encryption for its messaging service by using quantum computers.<\/p>\n<p>Think of it as state-of-the-art quantum security for messaging at scale, the company says, resulting in Apple&#8217;s messaging system being more secure against both current and future foes.<\/p>\n<p>Announced on <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" rel=\"nofollow noopener\" target=\"_blank\">Apple\u2019s Security Research blog<\/a>, the new iMessage protection is called PQ3 and promises the \u201cstrongest security properties of any at-scale messaging protocol in the world.\u201d<\/p>\n<p>The rationale behind this protection is \u201c<em>What if?<\/em>\u201d<\/p>\n<p>In this case, Apple\u2019s security teams asked themselves what might happen if hackers, criminals, or state-backed <a href=\"https:\/\/www.computerworld.com\/article\/3694132\/security-researchers-uncover-nso-group-iphone-attacks-in-europe.html\">rogue surveillance firms<\/a> gathered vast quantities of encrypted iMessage data today in order to break that encryption using quantum computers tomorrow.<\/p>\n<p>Apple calls this a <em>Harvest Now, Decrypt Later<\/em> attack. The new security protocol is designed to help protect against this.<\/p>\n<p>These attacks are less likely today than they might become. It is <a href=\"https:\/\/www.nature.com\/articles\/s41586-022-04623-2\" rel=\"nofollow noopener\" target=\"_blank\">widely accepted<\/a> that quantum computers will be capable of cracking the classical public key cryptography \u00a0such as RSA, Elliptic Curve signatures, and Diffie-Hellman key exchange in use today.<\/p>\n<p>Apple explains:<\/p>\n<p>\u201cAll these algorithms are based on difficult mathematical problems that have long been considered too computationally intensive for computers to solve, even when accounting for Moore\u2019s law. However, the rise of quantum computing threatens to change the equation. A sufficiently powerful quantum computer could solve these classical mathematical problems in fundamentally different ways, and therefore \u2014 in theory \u2014 do so fast enough to threaten the security of end-to-end encrypted communications.\u201d<\/p>\n<p>In truth, quantum computers are expensive, which means their use is largely limited to only the world\u2019s most powerful entities. But as more are made and costs decline, they will proliferate \u2014 and if Apple is considering the potential threat, then threat actors of various stripes will also be exploring the possibility.<\/p>\n<p>Apple isn\u2019t alone. The cryptographic community is also exploring Post-Quantum Cryptography (PQC), aiming to develop new public key algorithms that run on the devices we use today while protecting against the forms of attack we believe quantum computers will be able to deliver tomorrow.<\/p>\n<p>Signal, for example, <a href=\"https:\/\/signal.org\/blog\/pqxdh\/\" rel=\"nofollow noopener\" target=\"_blank\">introduced its own take on PQC security a few months ago<\/a>.<\/p>\n<p>iMessage takes this protection further.<\/p>\n<p>PQC is not only used to secure the \u201cinitial key establishment\u201d (when a shared algorithm is defined), but with the capability to restore security rapidly and automatically if that initial key becomes compromised.<\/p>\n<p>Apple has submitted PQ3 to two leading security researchers who have verified the technology \u2014 Professor David Basin of the Information Security Group at ETH in Zurich, Switzerland, and Douglas Stebila, a University of Waterloo Professor.<\/p>\n<p><a href=\"https:\/\/security.apple.com\/assets\/files\/A_Formal_Analysis_of_the_iMessage_PQ3_Messaging_Protocol_Basin_et_al.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Basin wrote<\/a>: \u201cWe have used Tamarin to formally verify the device-to-device messaging protocol PQ3. From our analysis, we conclude that this protocol achieves strong security guarantees against an active network adversary who can selectively compromise parties and has quantum computing capabilities.\u201d<\/p>\n<p><a href=\"https:\/\/tamarin-prover.com\/\" rel=\"nofollow noopener\" target=\"_blank\">Tamarin<\/a> is a leading security verification tool.<\/p>\n<p><a href=\"https:\/\/security.apple.com\/assets\/files\/Security_analysis_of_the_iMessage_PQ3_protocol_Stebila.pdf\" rel=\"nofollow noopener\" target=\"_blank\">Stabila said<\/a>: \u201cThe analysis shows that PQ3 provides confidentiality with forward secrecy and post-compromise security against both classical and quantum adversaries, in both the initial key exchange as well as the continuous rekeying phase of the protocol.\u201d<\/p>\n<p>Research papers describing the academic research conducted by both professors are available via Apple\u2019s security website, where you will also find a far more <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" rel=\"nofollow noopener\" target=\"_blank\">in-depth analysis of how PQ3 works and the protections it provides<\/a>.<\/p>\n<p>The signal Apple is sending with the introduction of this protection in iMessage should not be ignored. It should be seen as both a promise and a warning.<\/p>\n<p>Enterprise tech leaders and IT should, therefore, also work toward protecting their own data against potential quantum computing-led attacks.<\/p>\n<p>At the very least, this will involve staying abreast of new research in the field from the likes of the US Department of Commerce\u2019s National Institute of Standards and Technology (NIST), which <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms\" rel=\"nofollow noopener\" target=\"_blank\">announced\u00a0some preliminary encryption tools<\/a>\u00a0for the post-quantum era in 2022. A response might also involve insisting on such protection in new purchasing relationships.<\/p>\n<p>It explains that iMessage conversations between devices that support PQ3 are automatically ramping up to the post-quantum encryption protocol. \u201cAs we gain operational experience with PQ3 at the massive global scale of iMessage, it will fully replace the existing protocol within all supported conversations this year.\u201d<\/p>\n<p>For Apple, the protection reflects the extent to which privacy and security enhancements have been integral to its iMessage service since it was first introduced. It builds, for example, on robust protections such as <a href=\"https:\/\/www.applemust.com\/how-to-use-lockdown-mode-on-your-iphone-ipad-and-mac\/\" rel=\"nofollow noopener\" target=\"_blank\">Lockdown Mode<\/a> and <a href=\"https:\/\/www.computerworld.com\/article\/3711340\/what-is-contact-key-verification-and-how-is-it-used.html\">Contact Key Verification<\/a> that already exist.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3713081\/apples-imessage-gains-industry-leading-quantum-security.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/08\/23\/11\/microsoft-quantum-computer-source-ms-quantum-100832328-small-100945095-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Apple is preparing for future threats to iMessage by introducing upgraded encryption for its messaging service by using quantum computers.<\/p>\n<p>Think of it as state-of-the-art quantum security for messaging at scale, the company says, resulting in Apple&#8217;s messaging system being more secure against both current and future foes.<\/p>\n<h2><strong>What is the protection?<\/strong><\/h2>\n<p>Announced on <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" rel=\"nofollow noopener\" target=\"_blank\">Apple\u2019s Security Research blog<\/a>, the new iMessage protection is called PQ3 and promises the \u201cstrongest security properties of any at-scale messaging protocol in the world.\u201d<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3713081\/apples-imessage-gains-industry-leading-quantum-security.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,15547,5897,11050,714],"class_list":["post-24006","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-messaging-apps","tag-privacy","tag-quantum-computing","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24006"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24006\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24006"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}