Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Best Read-It-Later Apps for Curating Your Longreads

    June 8, 2025

    The OnePlus Pad 3 tablet is still perfect for play and still awkward for work

    June 8, 2025

    The most fun camera app I’ve used in forever

    June 8, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Apple’s iMessage Is Getting Post-Quantum Encryption
    Security

    Apple’s iMessage Is Getting Post-Quantum Encryption

    News RoomBy News RoomFebruary 24, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Apple is launching its first post-quantum protections, one of the biggest deployments of the future-resistant encryption technology to date.

    Billions of medical records, financial transactions, and messages we send to each other are protected by encryption. It’s fundamental to keeping modern life and the global economy running relatively smoothly. However, the decades-long race to create vastly powerful quantum computers, which could easily crack current encryption, creates new risks.

    While practical quantum computing technology may still be years or decades away, security officials, tech companies, and governments are ramping up their efforts to start using a new generation of post-quantum cryptography. These new encryption algorithms will, in short, protect our current systems against any potential quantum computing-based attacks.

    Today Cupertino is announcing that PQ3—its post-quantum cryptographic protocol—will be included in iMessage. The update will launch in iOS and iPad OS 17.4 and macOS 14.4 after previously being deployed in the beta versions of the software. Apple, which published the news on its security research blog, says the change is the “most significant cryptographic security upgrade in iMessage history.”

    “We rebuilt the iMessage cryptographic protocol from the ground up,” its blog post says, adding that the upgrade will fully replace its existing encryption protocols by the end of this year. You don’t need to do anything other than update your operating system for the new protections to be applied.

    Quantum computing is serious business. Governments in the US, China, and Russia as well as tech companies such as Google, Amazon, and IBM are plowing billions into the (still) relatively nascent efforts to create quantum computers. If successful, the technologies could help unlock scientific breakthroughs in everything from drug design to creating longer-lasting batteries. Politicians are also vying to become quantum superpowers. The current quantum computing devices are still experimental and not practical for general use.

    Unlike the computers we use today, quantum computers use qubits, which can exist in more than one state. (Current bits are either ones or zeroes). It means that quantum devices can store more information than traditional computers and perform more complex calculations, including potentially cracking encryption.

    “Quantum computers, if deployed reliably and in a scalable manner, would have the potential to break most of today’s cryptography,” says Lukasz Olejnik, an independent cybersecurity and privacy researcher and consultant. This includes the encryption in the messaging apps that billions of people use every day. Most encrypted messaging apps using public key cryptography have used RSA, Elliptic Curve, or Diffie-Hellman algorithms.

    Responding to the potential threat—which has been known about since the 1990s—intelligence and security agencies have become increasingly vocal about developing and deploying quantum-resistant cryptography. The National Institute of Standards and Technology in the US has been a driving force behind the creation of these new encryption types. Olejnik says tech companies are taking the quantum threat “very” seriously. “Much more serious than some older changes like switches between hash functions,” Olejnik says, adding that things are moving relatively fast given that post-quantum cryptography is still “very young” and there’s “no functional quantum computer on the horizon.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThese States Are Basically Begging You to Get a Heat Pump
    Next Article Victrola’s Sonos-ready turntable is down to an unbeatable price

    Related Posts

    What Really Happened in the Aftermath of the Lizard Squad Hacks

    June 7, 2025

    How the Farm Industry Spied on Animal Rights Activists and Pushed the FBI to Treat Them as Bioterrorists

    June 5, 2025

    The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare

    June 5, 2025

    A GPS Blackout Would Shut Down the World

    June 4, 2025

    You’re Not Ready

    June 4, 2025

    A Hacker May Have Deepfaked Trump’s Chief of Staff in a Phishing Campaign

    June 4, 2025
    Our Picks

    The OnePlus Pad 3 tablet is still perfect for play and still awkward for work

    June 8, 2025

    The most fun camera app I’ve used in forever

    June 8, 2025

    Xbox console games are suddenly showing up inside the Xbox PC app

    June 8, 2025

    Barry Diller Invented Prestige TV. Then He Conquered the Internet

    June 7, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    At the Bitcoin Conference, the Republicans were for sale

    By News RoomJune 7, 2025

    “I want to make a big announcement,” said Faryar Shirzad, the chief policy officer of…

    A ban on state AI laws could smash Big Tech’s legal guardrails

    June 7, 2025

    Everything You Need to Know About MicroSD Express

    June 7, 2025

    Apple’s latest AirPods Pro with USB-C just received a $70 discount

    June 7, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.