Categories: Uncategorized

Zoom bolsters includes post-quantum end-to-end encryption in Zoom Workplace

As adversarial threats become more sophisticated, so does the need to safeguard user data. In certain circumstances, attackers may have the ability to capture encrypted network traffic now, with the intent to decrypt it later when quantum computers become more advanced — a scenario often referred to as “harvest now, decrypt later”.  So, while powerful quantum computers with this capability are not yet generally available, Zoom has taken a proactive stance by upgrading the algorithms designed to be able to withstand these potential future threats. 

“Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs,”  said Michael Adams, chief information security officer at Zoom. “With the launch of post-quantum E2EE,  we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.”

How post-quantum E2E encryption works

When users enable E2EE for their meetings, Zoom’s system is designed to provide only the participants with access to the encryption keys that are used to encrypt the meeting; this is the behavior for both post-quantum E2EE and standard E2EE. Because Zoom’s servers do not have the necessary decryption key, encrypted data relayed through Zoom’s servers is indecipherable. In addition, to defend against “harvest now, decrypt later” attacks, Zoom’s post-quantum E2E encryption uses Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203.

Navanwita Bora Sachdev

Navanwita is the editor of The Tech Panda who also frequently publishes stories in news outlets such as The Indian Express, Entrepreneur India, and The Business Standard

Recent Posts

Telcos Bet on Sovereign AI, Satellites & Edge Intelligence to Escape the ‘Dumb Pipe’ Trap

Telecom operators are entering a pivotal phase, where their future role in the AI economy…

2 days ago

NBFCs & Neobanks Are Scaling Finance Fast but the Risks Are Scaling Too

In global financial system, while traditional banks once dominated the flow of credit and capital,…

2 days ago

India Inc. Increments are Stabilizing at ~9% as Companies Focus on Cost Discipline: Deloitte India Talent Outlook

Against the backdrop of a resilient macroeconomic environment and sector-specific growth dynamics, salary increment budgets…

3 days ago

Funding alert: Tech startups that raked in moolah this month

The Tech Panda takes a look at recent funding events in the tech ecosystem, seeking…

4 days ago

Fundraising Is Storytelling, Not Slide-Building—And AI Is Changing That Equation

For years, many founders believed that successful fundraising was about building the perfect pitch deck.…

4 days ago

AI Launches: Infrastructure, Mobile Phones, Sales, Cloud & Crypto

The Tech Panda takes a look at recent launches in the superfast field of Artificial…

4 days ago