Cloudflare Research: Post-Quantum Key Agreement
On essentially all domains served (1) through Cloudflare, including this one, we have enabled hybrid post-quantum key agreement. We are also rolling out support for post-quantum key agreement for connection from Cloudflare to origins (3). Check out our blog post the state of the post-quantum Internet for more context.
Checking connection …
Deployed key agreements
Available with TLSv1.3 including HTTP/3 (QUIC)
Key agreement | TLS identifier | |
---|---|---|
X25519Kyber768Draft00 | 0x6399 (recommended) and 0xfe31 (obsolete) |
|
X25519Kyber512Draft00 | 0xfe30 |
Software support
- Default [new!] for Chrome 124+ on Desktop.
For older Chrome or on Mobile, you need to
toggle TLS 1.3 hybridized Kyber support
(
enable-tls13-kyber
) inchrome://flags.
- Default for Edge 124+. [new!]
- Firefox 124+
if you turn on
security.tls.enable_kyber
inabout:config
. - Our fork of Go.
- BoringSSL. Upstream only
supports
0x6399
; for the others use our old fork. - Our fork of QUIC-go.
- Goutam Tamvada's fork of Firefox.
- Open Quantum Safe C library.
- Zig 0.11.0+
- nginx when compiled with BoringSSL (guide).
- Caddy HTTP server nightly compiled with cfgo.
- Botan C++ library 3.2.0+ (instructions)
- ISRG's fork of Rustls [new!]
References
- The state of the post-quantum Internet (early 2024)
- tldr.fail explains how large post-quantum ClientHello could break buggy software.
Contact
You can reach us directly at ask-research@cloudflare.com with questions and feedback.