{"id":24016,"date":"2024-02-28T11:04:22","date_gmt":"2024-02-28T19:04:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17746\/"},"modified":"2024-02-28T11:04:22","modified_gmt":"2024-02-28T19:04:22","slug":"news-17746","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17746\/","title":{"rendered":"Apple iOS 17.4: iMessage Gets Post-Quantum Encryption in New Update"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/65d60252f14794bc53bece50\/master\/pass\/Apple%E2%80%99s-iMessage-Is-Getting-Post-Quantum-Encryption--Security-GettyImages-1978192381.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 21 Feb 2024 14:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-jWHrLH hAfVoD byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cVPPwi byline__name\"><a class=\"BaseWrap-sc-gjQpdd BaseText-ewhhUZ BaseLink-eNWuiM BylineLink-gEnFiw iUEiRd kZoQA-D ecbzIP BDKtv byline__name-link button\" href=\"\/author\/matt-burgess\/\">Matt Burgess<\/a><\/span><\/span><\/p>\n<p><span class=\"lead-in-text-callout\">Apple is launching<\/span> its first post-quantum protections, one of the biggest deployments of the future-resistant encryption technology to date.<\/p>\n<p class=\"paywall\">Billions of medical records, financial transactions, and messages we send to each other are protected by <a href=\"https:\/\/www.wired.com\/2014\/11\/hacker-lexicon-end-to-end-encryption\/\">encryption<\/a>. It\u2019s fundamental to keeping modern life and the global economy running relatively smoothly. However, the decades-long race to create <a href=\"https:\/\/www.wired.com\/story\/wired-guide-to-quantum-computing\/\">vastly powerful quantum computers<\/a>, which could easily crack current encryption, creates new risks.<\/p>\n<p class=\"paywall\">While practical quantum computing technology may still be years or decades away, security officials, tech companies, and governments are ramping up their efforts to start using a new generation of post-quantum cryptography. These new encryption algorithms will, in short, protect our current systems against any potential quantum computing-based attacks.<\/p>\n<p class=\"paywall\">Today Cupertino is announcing that PQ3\u2014its post-quantum cryptographic protocol\u2014will be included in iMessage. The update will launch in iOS and iPad OS 17.4 and macOS 14.4 after previously being deployed in the beta versions of the software. Apple, which published the <a data-offer-url=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/security.apple.com\/blog\/imessage-pq3\/&quot;}\" href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" rel=\"noopener\" target=\"_blank\">news on its security research blog<\/a>, says the change is the \u201cmost significant cryptographic security upgrade in iMessage history.\u201d<\/p>\n<p class=\"paywall\">\u201cWe rebuilt the iMessage cryptographic protocol from the ground up,\u201d its blog post says, adding that the upgrade will fully replace its existing encryption protocols by the end of this year. You don\u2019t need to do anything other than update your operating system for the new protections to be applied.<\/p>\n<p class=\"paywall\">Quantum computing is serious business. Governments in the US, China, and Russia as well as tech companies such as <a href=\"https:\/\/www.wired.co.uk\/article\/quantum-supremacy-google-microsoft-ibm\">Google<\/a>, <a href=\"https:\/\/www.wired.com\/story\/amazon-joins-quantum-computing-race\/\">Amazon<\/a>, and IBM are plowing billions into the (still) relatively nascent efforts to create quantum computers. If successful, the technologies could help unlock scientific breakthroughs in everything from drug design to creating longer-lasting batteries. Politicians are also vying to become <a href=\"https:\/\/www.wired.co.uk\/article\/quantum-computing-china-us\">quantum superpowers<\/a>. The current quantum computing devices are still <a href=\"https:\/\/www.wired.com\/story\/the-holy-grail-of-quantum-computing\/\">experimental and not practical<\/a> for general use.<\/p>\n<p class=\"paywall\">Unlike the computers we use today, quantum computers use qubits, which can exist in more than one state. (Current bits are either ones or zeroes). It means that quantum devices can store more information than traditional computers and perform more complex calculations, including potentially cracking encryption.<\/p>\n<p class=\"paywall\">\u201cQuantum computers, if deployed reliably and in a scalable manner, would have the potential to break most of today\u2019s cryptography,\u201d says Lukasz Olejnik, an independent cybersecurity and privacy researcher and consultant. This includes the encryption in the messaging apps that billions of people use every day. Most encrypted messaging apps using <a href=\"https:\/\/www.wired.com\/2014\/11\/hacker-lexicon-end-to-end-encryption\/\">public key cryptography<\/a> have used RSA, Elliptic Curve, or Diffie-Hellman algorithms.<\/p>\n<p class=\"paywall\">Responding to the potential threat\u2014which has been known about since the 1990s\u2014intelligence and security agencies <a data-offer-url=\"https:\/\/www.ncsc.gov.uk\/whitepaper\/next-steps-preparing-for-post-quantum-cryptography\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ncsc.gov.uk\/whitepaper\/next-steps-preparing-for-post-quantum-cryptography&quot;}\" href=\"https:\/\/www.ncsc.gov.uk\/whitepaper\/next-steps-preparing-for-post-quantum-cryptography\" rel=\"noopener\" target=\"_blank\">have become increasingly vocal<\/a> about developing and deploying quantum-resistant cryptography. The National Institute of Standards and Technology in the US has been a <a href=\"https:\/\/www.wired.co.uk\/article\/quantum-proof-encryption-is-here-but-theres-a-catch\">driving force behind the creation of these new encryption types<\/a>. Olejnik says tech companies are taking the quantum threat \u201cvery\u201d seriously. \u201cMuch more serious than some older changes like switches between hash functions,\u201d Olejnik says, adding that things are moving relatively fast given that post-quantum cryptography is still \u201cvery young\u201d and there\u2019s \u201cno functional quantum computer on the horizon.\u201d<\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Byron Tau<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Julian Chokkattu<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">David Nield<\/span><\/span><\/p>\n<p class=\"BylineWrapper-jWHrLH cExbzu byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-jbHncj fuDQVo\"><span data-testid=\"BylineName\" class=\"BylineName-kwmrLn cYaBaU byline__name\">Kate Knibbs<\/span><\/span><\/p>\n<p class=\"paywall\">Apple\u2019s rollout of PQ3 in iMessage follows <a href=\"https:\/\/www.wired.com\/story\/signal-tips-private-messaging-encryption\/\">Signal<\/a> in introducing post-quantum algorithms\u2014the encrypted messaging app <a data-offer-url=\"https:\/\/signal.org\/blog\/pqxdh\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/signal.org\/blog\/pqxdh\/&quot;}\" href=\"https:\/\/signal.org\/blog\/pqxdh\/\" rel=\"noopener\" target=\"_blank\">introduced its PQXDH specification in September<\/a>, saying it is built on the Kyber algorithm. Proton, the creator of encrypted email and other apps, said around the same time that it is <a data-offer-url=\"https:\/\/proton.me\/blog\/post-quantum-encryption\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/proton.me\/blog\/post-quantum-encryption&quot;}\" href=\"https:\/\/proton.me\/blog\/post-quantum-encryption\" rel=\"noopener\" target=\"_blank\">building quantum-safe PGP encryption for everyone to use<\/a>.<\/p>\n<p class=\"paywall\">In its blog post, Apple details how PQ3 has been built and how it operates. The company says PQ3 creates a new post-quantum encryption key as part of the public keys that phones and computers using iMessage create and transmit to Apple\u2019s servers. The company is using the Kyber algorithm\u2014the same approach as Signal\u2014to do this and will generate the keys from the first message that is sent, even if the person receiving the message is offline.<\/p>\n<p class=\"paywall\">Apple says its setup will apply its post-quantum protections to the creation of encryption keys and the exchange of messages, including if someone\u2019s encryption key has been compromised by an attacker. \u201cTo best protect end-to-end encrypted messaging, the post-quantum keys need to change on an ongoing basis to place an upper bound on how much of a conversation can be exposed by any single, point-in-time key compromise\u2014both now and with future quantum computers,\u201d the company says in its blog post.<\/p>\n<p class=\"paywall\">The post-quantum protections are an addition to its existing encryption, Apple says. It is using a \u201chybrid design\u201d that combines its current elliptic curve cryptography (ECC) with the newer post-quantum protections. \u201cDefeating PQ3 security requires defeating both the existing, classical ECC cryptography and the new post-quantum primitives,\u201d Apple writes.<\/p>\n<p class=\"paywall\">Apple says PQ3 has been externally assessed by a third-party security company, which it has not named, and also two groups of academics who have written papers analyzing the system. The company argues that its approach\u2014as it is able to issue new quantum keys\u2014has stronger protections than Signal\u2019s current deployment. \u201cWe conclude that this protocol achieves strong security guarantees against an active network adversary who can selectively compromise parties and has quantum computing capabilities,\u201d a research paper led by David Basin, a computer science professor at ETH Zurich, says of PQ3.<\/p>\n<p class=\"paywall\">While there\u2019s no guarantee that quantum technologies will ever develop enough to become useful, it\u2019s likely that the next few years will see a steady drip of companies deploying and enhancing their post-quantum protocols. In part, this is to combat one of the biggest current fears around quantum computing: that countries and threat actors are gathering and hoarding encrypted data today with the plan to unlock its secrets if quantum technologies evolve.<\/p>\n<p class=\"paywall\">Starting to deploy post-quantum encryption now\u2014before functional quantum computers exist\u2014has the potential to limit the impact of these so-called \u201charvest now, decrypt later\u201d attacks. \u201cWe are seeing our adversaries do this\u2014copying down our encrypted data and just holding on to it,\u201d Dustin Moody, who leads post-quantum encryption standards in the US told <a href=\"https:\/\/www.newyorker.com\/magazine\/2022\/12\/19\/the-world-changing-race-to-develop-the-quantum-computer\"><em>The New Yorker<\/em> in 2022<\/a>. \u201cIt\u2019s definitely a real threat.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/apple-pq3-post-quantum-encryption\/\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/65d60252f14794bc53bece50\/master\/pass\/Apple%E2%80%99s-iMessage-Is-Getting-Post-Quantum-Encryption--Security-GettyImages-1978192381.jpg\"\/><\/p>\n<p><strong>Credit to Author: Matt Burgess| Date: Wed, 21 Feb 2024 14:00:00 +0000<\/strong><\/p>\n<p>Useful quantum computers aren\u2019t a reality\u2014yet. But in one of the biggest deployments of post-quantum encryption so far, Apple is bringing the technology to iMessage.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358,21382,21357],"class_list":["post-24016","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks","tag-security-privacy","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24016"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24016\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24016"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}