The widespread use of quantum computer systems within the close to future might permit hackers to decrypt messages that had been encrypted with classical cryptography strategies at astonishing velocity. Apple has proposed an answer to this potential drawback: after the subsequent replace of their OSes, conversations in iMessage will likely be protected by a brand new post-quantum cryptographic protocol referred to as PQ3. This expertise permits you to change the algorithms of end-to-end encryption with a public key in order that they’ll work on classical non-quantum computer systems, however will present safety in opposition to potential hacking coming from utilizing future quantum computer systems.
Right now we’ll go over how this new encryption protocol works, and why it’s wanted.
How PQ3 works
All widespread prompt messaging purposes and providers right this moment implement normal uneven encryption strategies utilizing a private and non-private key pair. The general public secret is used to encrypt despatched messages and could be transmitted over insecure channels. The personal secret is mostly used to create symmetric session keys which can be then used to encrypt messages.
This stage of safety is adequate for now, however Apple is taking part in it protected – fearing that hackers could also be making ready for quantum computer systems forward of time. Because of the low price of information storage, attackers can accumulate big quantities of encrypted knowledge and retailer it till it may be decrypted utilizing quantum computer systems.
To stop this, Apple has developed a brand new cryptographic safety protocol referred to as PQ3. The important thing change is now protected with an extra post-quantum part. It additionally minimizes the variety of messages that might doubtlessly be decrypted.

Sorts of cryptography utilized in messengers. Supply
The PQ3 protocol will likely be obtainable in iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. The transition to the brand new protocol will likely be gradual: firstly, all consumer conversations on PQ3-enabled gadgets will likely be routinely switched to this protocol; then, later in 2024, Apple plans to fully exchange the beforehand used protocol of end-to-end encryption.
Typically, credit score is because of Apple for this imminent safety enhance; nonetheless, the corporate isn’t the primary to offer post-quantum cybersecurity of prompt messaging providers and purposes. Within the fall of 2023, Sign’s builders added help for the same protocol – PQXDH, which offers post-quantum prompt messaging safety for customers of up to date variations of Sign when creating new safe chats.
How the appearance of PQ3 will have an effect on the safety of Apple customers
In essence, Apple is including a post-quantum part to iMessage’s general message encryption scheme. In actual fact, PQ3 will solely be one aspect in its safety strategy together with conventional ECDSA uneven encryption.
Nonetheless, relying solely on post-quantum safety applied sciences isn’t suggested. Igor Kuznetsov, Director of Kaspersky’s World Analysis and Evaluation Staff (GReAT), commented on Apple’s improvements as follows:
“Since PQ3 nonetheless depends on conventional signature algorithms for message authentication, a man-in-middle attacker with a robust quantum laptop (but to be created) should still have an opportunity of hacking it.
Does it provide safety in opposition to adversaries able to compromising the system or unlocking it? No, PQ3 solely protects the transport layer. As soon as a message is delivered to an iDevice, there’s no distinction – it may be learn from the display, extracted by legislation enforcement after unlocking the cellphone, or exfiltrated by superior attackers utilizing Pegasus, TriangleDB or comparable software program.”
Thus, these involved concerning the safety of their knowledge mustn’t rely solely on trendy post-quantum cryptographic protocols. It’s essential to make sure full safety of your system to verify third-parties can’t attain your prompt messages.