NordVPN Promotion

Home / News

NordVPN Introduces Quantum-Resilient Encryption

Illustration: NordVPN

NordVPN, a leading VPN service provider, has unveiled its first application featuring quantum-resilient encryption—a significant advancement in cybersecurity. Post-quantum cryptography support is currently available on NordVPN’s Linux client, with plans to extend this enhanced security to all applications by early 2025.

Quantum decryption threat: “Cybercriminals are intensifying ‘harvest now, decrypt later’ attacks,” says Marijus Briedis, Chief Technology Officer of NordVPN. “They are amassing vast amounts of encrypted data to decrypt once quantum technology becomes viable. The VPN industry must evolve to defend against these future threats.”

This initiative aligns with recent announcements from the National Institute of Standards and Technology (NIST), which introduced its first post-quantum cryptographic standards. As VPNs rely heavily on cryptographic protocols to secure data and communications, adopting these emerging standards is crucial to maintaining robust security against the evolving capabilities of quantum computing.

NordVPN’s quantum-resilient encryption employs the ML-KEM algorithm, also known as Kyber, utilizing a hybrid approach. The process begins with establishing a standard WireGuard session, followed by a pre-shared key exchange based on the Kyber algorithm. Both client and server then use this key to add an additional layer of quantum-secure encryption, enhancing security without significantly impacting performance.

By 2025, NordVPN aims to introduce this quantum-resistant cryptography across all its applications. “As cryptographic needs evolve, the demand for crypto-agility that enables systems to adapt to new cryptographic standards seamlessly will be essential,” says Briedis.

 

By CircleID Reporter

CircleID’s internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us.

Visit Page

Filed Under

Comments

Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

Related

Topics

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

NordVPN Promotion