Google quantum-proofs HTTPS by squeezing 2.5kB of data into 64-byte space

2026-02-28T11:53:52.000Z·★ 96·1 min read
Google adds post-quantum ML-DSA signatures to TLS certificate transparency logs using Merkle Tree Certificates, keeping sizes at ~4KB while protecting against future quantum attacks.

Google is adding quantum-resistant cryptographic material to TLS certificate transparency logs, using Merkle Trees and clever compression to keep certificate sizes at ~4KB while protecting against future quantum attacks.

The Threat

Once viable, Shor's algorithm could forge classical encryption signatures and break public keys in certificate transparency logs. An attacker could forge signed certificate timestamps, making browsers accept certificates that were never legitimately registered.

The Solution: MTCs + Post-Quantum Signatures

Google is adding material from quantum-resistant algorithms (ML-DSA) to certificate logs. Forgeries would then require breaking both classical and post-quantum encryption simultaneously.

Merkle Tree Certificates (MTCs) use Merkle Trees to provide quantum-resistant assurances that a certificate has been published, without adding the full length of new keys and hashes. Using compression techniques, MTCs remain at roughly the same 4KB size as current certificates.

Implementation

Context

Certificate transparency logs were created in response to the 2011 DigiNotar hack, which produced 500 counterfeit certificates used to spy on users. The new quantum-resistant layer ensures these logs remain trustworthy even in a post-quantum world.


Source: Ars Technica

↗ Original source
← Previous: Google's Opal just quietly showed enterprise teams the new blueprint for building AI agentsNext: OpenAI – How to delete your account →
Comments0