Education Center

Enable Post Quantum Cryptography Support in Web Browsers

Author avatar

Alexandre Aufrère

PQC Specialist - CTO

Cover image

As you might have heard, current cryptographic algorithms are going to be obsoleted in the near future. Hence the need to enable post-quantum cryptography operations in tasks involving these algorithms.

One prominent cryptographic task involved in TLS secure communications is called key exchange. In this operation, a key to be used further in encrypting communications is exchanged between your web browser and the web server you're connecting to.

Fortunately, modern web browsers already support post-quantum cryptography for key exchange, though that needs to be enabled in the browsers. This article will drive you through enabling it in most browsers.

Google Chrome and Microsoft Edge

To enable secure, post-quantum hybrid key exchange support in Google Chrome or Microsoft Edge, follow these steps:

  1. Type chrome://flags in the URL bar

  2. Type "kyber" in the search bar

  3. Enable all options (one or two options depending on your browser) using the button on the right

You will then need to restart your web browser to activate this feature.

How to enable Post-Quantum Cryptography key exchange support in Chrome and Edge How to enable Post-Quantum Cryptography key exchange support in Chrome and Edge

Mozilla Firefox

To enable secure, post-quantum hybrid key exchange support in Mozilla Firefox, follow these steps:

  1. Type about:config in the URL bar

  2. Type "security.tls.enable_kyber" in the search bar

  3. Enable the option as a boolean

You will then need to restart your web browser to activate this feature.

How to enable Post-Quantum Cryptography key exchange support in Firefox How to enable Post-Quantum Cryptography key exchange support in Firefox

Note: Support within Apple Safari is yet to be announced.

Recommended articles

Logo EVERTRUST

EVERTRUST is a European company that provides a complete solution to manage your certificates. We are a team of experts in security and cryptography.

EVERTRUST

Products

Use cases

 


EVERTRUST© 2024 - All rights reserved. Privacy policy Terms & Mentions