{"id":572319,"date":"2019-08-06T16:00:38","date_gmt":"2019-08-06T23:00:38","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=572319"},"modified":"2020-03-27T16:29:44","modified_gmt":"2020-03-27T23:29:44","slug":"post-quantum-tls","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/post-quantum-tls\/","title":{"rendered":"Post-Quantum TLS"},"content":{"rendered":"

The Transport Layer Security (TLS) protocol<\/h2>\n

The Transport Layer Security (TLS) protocol is one of the most widely-used security protocols in use today, protecting the information exchanged between web clients and servers all around the world. While TLS is secure against today\u2019s classical computers, the asymmetric cryptography in TLS is unfortunately vulnerable to future attacks from quantum computers.<\/p>\n

\"\"<\/p>\n

 <\/p>\n

Both the RSA and Elliptic Curve Diffie-Hellman asymmetric algorithms which set up the TLS exchange will succumb to Shor’s algorithm on a sufficiently large quantum computer. While a quantum computer of that size and stability may be 5 to 15 years off, cryptographers from around the world are already working to identify new, quantum-safe algorithms.<\/p>\n

Post-Quantum Cryptography TLS<\/h2>\n

Given the importance of TLS, preparing for the transition to post-quantum cryptography needs to start now.\u00a0 Asymmetric cryptography in TLS is vulnerable in two places:<\/p>\n