Apple is. Introducing Enhancements to its iMessage texting platform aimed at bolstering its resistance to emerging quantum-based potential decryption. Encryption– Disruptive technologies.

iPhone 15 Pro.iPhone 15 Pro.

iPhone 15 Pro – the ideal photo. Image credit: Sofia Stark via Unsplash, free license

The new protocol, called PQ3, marks a proactive stance by U.S. technology companies in preparing for potential advances in quantum computing that could render current communication security methods ineffective.

In a blog post published on Wednesday, Apple explained that the PQ3 protocol is not just a replacement for an existing algorithm but a comprehensive reconstruction of the iMessage cryptographic protocol. This overhaul is set to replace the current protocol in all supported communications later this year.

The California-based company claims that its encryption algorithms are state-of-the-art and there has been no evidence of a successful attack to date. However, there is growing concern among government officials and scientists about its potential effects. Quantum computers – Advanced machines exploiting the properties of subatomic particles – which can significantly and suddenly weaken existing encryption protections.

Apple’s blog highlights that PQ3 adds a new and overlapping set of technical safeguards designed to minimize this vulnerability window.

America and China. Actively prepare For this anticipated moment, often referred to as “Q-Day”. Both countries are investing heavily in quantum research and exploring new encryption standards, particularly post-quantum cryptography, to stay ahead of potential threats.

The race involves substantial financial commitments and has led to accusations between Washington and Beijing about intercepting large amounts of encrypted data in preparation for Q-Day, a strategy known colloquially as “grab now, Later called “crack”.

The US cyber watchdog agency, the Cybersecurity and Infrastructure Security Agency, emphasized the importance of early planning in its 2022 advisory, saying that cyber-threat actors can target existing data that will need protection in the future.

written by Alius Norica