Google announced on Friday its new strategy to safeguard Chrome browser's HTTPS certificates from quantum computer threats while ensuring the transition doesn't disrupt internet performance.
The challenge is significant due to the quantum-resistant cryptographic data needed for HTTPS certificates being about 40 times larger than the current cryptographic material. Presently, a standard X.509 certificate chain includes six elliptic curve signatures and two elliptic curve public keys, each 64 bytes in size. This current cryptographic framework is vulnerable to quantum-enabled Shorโs algorithm. Typically, the full certificate chain is roughly 4 kilobytes and must be transmitted every time a browser connects to a website.
As Bas Westerbaan, a principal research engineer at Cloudflare, which partners with Google on this initiative, explained: โThe larger the certificate, the slower the handshake, increasing the risk of compromising the user experience and excluding users who might disable the new encryption if it impacts their browsing speeds.โ The bulkier certificates could also burden intermediary systems, called