Cloudflare Enables Post-Quantum Encryption in WARP Client

Cloudflare has implemented post-quantum key agreement within its WARP client, aiming to protect user data from future quantum computing-based attacks. This move addresses the “harvest now, decrypt later” threat by securing traffic even if individual connections haven’t yet been upgraded to post-quantum cryptography.
The rollout involved a careful, multi-phased approach due to the complexity of supporting five operating systems (Windows, macOS, Linux, iOS, and Android/ChromeOS) and maintaining consistency across both consumer (1.1.1.1) and enterprise (Cloudflare One Agent) versions. A key challenge was ensuring stability with the relatively new MASQUE protocol.
Cloudflare employed three techniques: temporary cryptographic downgrades (allowing fallback to classical encryption if post-quantum negotiation fails), a gradual rollout to monitor for issues, and a Mobile Device Management (MDM) override enabling immediate activation for customers who desire it. The phased approach begins with allowing downgrades for robustness, then transitions to enforcing post-quantum connections for enhanced security.
To comply with U.S. government standards like FedRAMP and FIPS, internal connections utilize a hybrid approach combining FIPS-compliant EDCH with an early version of ML-KEM-768. The company emphasizes its commitment to making post-quantum security accessible to everyone, free of charge, and plans to eventually incorporate post-quantum signatures and certificates for complete protection. Users can begin utilizing the enhanced security today by downloading and installing the latest WARP client.
Surfaced by the Thriving lens — one of the vital signs ovr.news reads.
How we evaluated this
AI summary
read the original for the full story — Read on blog.cloudflare.com . How we work →