Google Unveils Plan to Secure Chrome's HTTPS Certificates Against Quantum Threats

On Friday, Google revealed its strategy to secure HTTPS certificates in its Chrome browser to protect against quantum computer attacks, aiming to achieve this without disrupting internet functionality.

This undertaking presents challenges, as the quantum-resistant cryptographic data required for publicly publishing TLS certificates is significantly larger—approximately 40 times—than the classical cryptographic materials currently in use. Present-day X.509 certificates measure around 64 bytes, comprising six elliptic curve signatures and two EC public keys, which can be potentially compromised through Shor’s algorithm powered by quantum computing. In contrast, certificates with equivalent quantum-resistant properties are about 2.5 kilobytes in size, all of which must be transmitted when a browser connects to a site.

The bigger they come, the slower they move

“The bigger you make the certificate, the slower the handshake and the more people you leave behind,” said Bas Westerbaan, a principal research engineer at Cloudflare, a key partner with Google in this transition. Westerbaan noted that users might disable new encryption if it degrades browsing speed. Additionally, the increased certificate size could impact "middle boxes," which function as intermediaries between browsers and their destination sites.

To overcome these obstacles, companies are turning to Merkle Trees, a sophisticated data structure employing cryptographic hashes and mathematical operations to verify extensive amounts of information using minimal data compared to traditional public key infrastructure techniques.

According to Google’s Chrome Secure Web and Networking Team members, Merkle Tree Certificates “replace the heavy, serialized chain of signatures found in traditional PKI with compact Merkle Tree proofs.” They explained, “In this model, a Certification Authority (CA) signs a single ‘Tree Head’ representing potentially millions of certificates, and the ‘certificate’ sent to the browser is merely a lightweight proof of inclusion in that tree.”

← Back to News