{"id":22432,"date":"2024-02-23T11:49:36","date_gmt":"2024-02-23T07:49:36","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22432"},"modified":"2024-02-23T11:49:36","modified_gmt":"2024-02-23T07:49:36","slug":"apple-pq3-quantum-secure-messaging","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/22432\/","title":{"rendered":"Post-quantum iMessage: the next step in privacy protection"},"content":{"rendered":"<p>The widespread use of quantum computers in the near future may allow hackers to decrypt messages that were encrypted with classical cryptography methods at astonishing speed. <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" target=\"_blank\" rel=\"nofollow noopener\">Apple has proposed<\/a> a solution to this potential problem: after the next update of their OSes, conversations in iMessage will be protected by a new post-quantum cryptographic protocol called PQ3. This technology allows you to change the algorithms of end-to-end encryption with a public key so that they can work on classical non-quantum computers, but will provide protection against potential hacking coming from using future quantum computers.<\/p>\n<p>Today we\u2019ll go over how this new encryption protocol works, and why it\u2019s needed.\n<\/p>\n<h2>How PQ3 works<\/h2>\n<p>\nAll popular instant messaging applications and services today implement standard <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/asymmetric-encryption\/\" target=\"_blank\" rel=\"noopener\">asymmetric encryption<\/a> methods using a public and private key pair. The public key is used to encrypt sent messages and can be transmitted over insecure channels. The private key is most commonly used to create <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/symmetric-encryption\/\" target=\"_blank\" rel=\"noopener\">symmetric<\/a> session keys that are then used to encrypt messages.<\/p>\n<p>This level of security is sufficient for now, but Apple is playing it safe \u2013 fearing that hackers may be preparing for quantum computers ahead of time. Due to the low cost of data storage, attackers can collect huge amounts of encrypted data and store it until it can be decrypted using quantum computers.<\/p>\n<p>To prevent this, Apple has developed a new cryptographic protection protocol called PQ3. The key exchange is now protected with an additional post-quantum component. It also minimizes the number of messages that could potentially be decrypted.<\/p>\n<div id=\"attachment_50695\" style=\"width: 2371px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/23114406\/apple-pq3-quantum-secure-messaging-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50695\" class=\"size-full wp-image-50695\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/23114406\/apple-pq3-quantum-secure-messaging-01.png\" alt=\"Types of cryptography used in messengers\" width=\"2361\" height=\"1175\"><\/a><p id=\"caption-attachment-50695\" class=\"wp-caption-text\">Types of cryptography used in messengers. <a href=\"https:\/\/security.apple.com\/blog\/imessage-pq3\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The PQ3 protocol will be available in iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. The transition to the new protocol will be gradual: firstly, all user conversations on PQ3-enabled devices will be automatically switched to this protocol; then, later in 2024, Apple plans to completely replace the previously used protocol of end-to-end encryption.<\/p>\n<p>Generally, credit is due to Apple for this imminent security boost; however, the company isn\u2019t the first to provide post-quantum cybersecurity of instant messaging services and applications. In the fall of 2023, Signal\u2019s developers added <a href=\"https:\/\/signal.org\/blog\/pqxdh\/\" target=\"_blank\" rel=\"nofollow noopener\">support for a similar protocol \u2013 PQXDH<\/a>, which provides post-quantum instant messaging security for users of updated versions of Signal when creating new secure chats.\n<\/p>\n<h2>How the advent of PQ3 will affect the security of Apple users<\/h2>\n<p>\nIn essence, Apple is adding a post-quantum component to iMessage\u2019s overall message encryption scheme. In fact, PQ3 will only be one element in its security approach along with traditional <a href=\"https:\/\/en.wikipedia.org\/wiki\/Elliptic_Curve_Digital_Signature_Algorithm\" target=\"_blank\" rel=\"nofollow noopener\">ECDSA<\/a> asymmetric encryption.<\/p>\n<p>However, relying solely on post-quantum protection technologies isn\u2019t advised. Igor Kuznetsov, Director of Kaspersky\u2019s Global Research and Analysis Team (GReAT), commented on Apple\u2019s innovations as follows:<\/p>\n<p><em>\u201cSince PQ3 still relies on traditional signature algorithms for message\u00a0authentication, a\u00a0<\/em><a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\"><em>man-in-middle<\/em><\/a><em> attacker\u00a0with a powerful quantum computer (yet to be created)\u00a0may still have a chance of hacking it.<\/em><\/p>\n<p><em>Does it offer protection against adversaries capable of compromising the device or unlocking it? No, PQ3 only protects the transport layer. Once a message is delivered to an iDevice, there\u2019s no difference \u2013 it can be read from the screen, extracted by law enforcement after unlocking the phone, or exfiltrated by advanced attackers using <\/em><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-from-pegasus-spyware\/43453\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>Pegasus<\/em><\/a><em>, <\/em><a href=\"https:\/\/securelist.com\/trng-2023\/\" target=\"_blank\" rel=\"noopener\"><em>TriangleDB<\/em><\/a><em> or similar software.\u201d<\/em><\/p>\n<p>Thus, those concerned about the protection of their data should not rely only on modern post-quantum cryptographic protocols. It\u2019s important to ensure <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">full protection<\/a>\u00a0of your device to make sure third-parties can\u2019t reach your instant messages.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Apple has released a new encryption protocol \u2013 PQ3 \u2013 for iMessage, which provides post-quantum security for instant messaging.<\/p>\n","protected":false},"author":2754,"featured_media":22434,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225],"tags":[14,1963,261,2138,448],"class_list":{"0":"post-22432","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-apple","9":"tag-confidentiality","10":"tag-encryption","11":"tag-imessage","12":"tag-quantum-computers"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/22432\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apple-pq3-quantum-secure-messaging\/27122\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/11430\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/29796\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apple-pq3-quantum-secure-messaging\/27298\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/27048\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/apple-pq3-quantum-secure-messaging\/29706\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/apple-pq3-quantum-secure-messaging\/28550\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/apple-pq3-quantum-secure-messaging\/37044\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/apple-pq3-quantum-secure-messaging\/12065\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-pq3-quantum-secure-messaging\/50692\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/apple-pq3-quantum-secure-messaging\/21549\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/apple-pq3-quantum-secure-messaging\/22248\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/apple-pq3-quantum-secure-messaging\/30943\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/apple-pq3-quantum-secure-messaging\/35840\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/apple-pq3-quantum-secure-messaging\/27487\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-pq3-quantum-secure-messaging\/33304\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-pq3-quantum-secure-messaging\/32928\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/encryption\/","name":"encryption"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2754"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22432"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22432\/revisions"}],"predecessor-version":[{"id":22433,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22432\/revisions\/22433"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22434"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}