CECPQ1
{{short description|Experimental post-quantum key exchange developed by Google}}
In cryptography, CECPQ1 (combined elliptic-curve and post-quantum 1) is a post-quantum key-agreement protocol developed by Google as a limited experiment{{Cite web|title=Experimenting with Post-Quantum Cryptography|url=https://security.googleblog.com/2016/07/experimenting-with-post-quantum.html|access-date=2020-12-26|website=Google Online Security Blog|language=en}} for use in Transport Layer Security (TLS) by web browsers. It was succeeded by CECPQ2.
Details
CECPQ1 was designed to test algorithms that can provide confidentiality even against an attacker who possesses a large quantum computer. It is a key-agreement algorithm for TLS that combines X25519 and NewHope, a ring learning with errors primitive. Even if NewHope were to turn out to be compromised, the parallel X25519 key-agreement ensures that CECPQ1 provides at least the security of existing connections.{{cite web|url=https://www.cnet.com/au/news/chrome-updated-so-tomorrows-quantum-computers-cant-crack-todays-encryption|title=Chrome: Stop future computers from cracking current encryption|publisher=CNET}}
It was available in Google Chrome 54 beta.{{cite web|url=https://phoronix.com/scan.php?page=news_item&px=Chrome-54-Beta-Released|title=Chrome 54 Beta Brings Custom Elements V1: Create Custom HTML Tags - Phoronix|publisher=Phoronix}} In 2016, its experimental use in Chrome ended and it was planned to be disabled in a later Chrome update.{{cite web|url=https://www.imperialviolet.org/2016/11/28/cecpq1.html|title=CECPQ1 results (28 Nov 2016)|publisher=Adam Langley, security officer at Google}}
It was succeeded by CECPQ2.
See also
- Elliptic-curve Diffie–Hellman (ECDH) – an anonymous key agreement protocol