Friday, April 24, 2026
techverdict
  • Home
  • Artificial Intelligence
    • ChatGPT
    • Claude
    • Gemini
    • Perplexity
  • Cybersecurity
    • Antivirus & Malware Protection
    • Network and Firewall Security
    • Password Managers
    • VPN
    • Identity & Data Protection
  • Smart home
    • Alexa
    • Google Home
    • Matter
  • Technology
    • Desktop
    • Laptop
    • Smartwatches
    • Phones
  • Review
    • VPN
No Result
View All Result
SAVED POSTS
techverdict
  • Home
  • Artificial Intelligence
    • ChatGPT
    • Claude
    • Gemini
    • Perplexity
  • Cybersecurity
    • Antivirus & Malware Protection
    • Network and Firewall Security
    • Password Managers
    • VPN
    • Identity & Data Protection
  • Smart home
    • Alexa
    • Google Home
    • Matter
  • Technology
    • Desktop
    • Laptop
    • Smartwatches
    • Phones
  • Review
    • VPN
No Result
View All Result
techverdict
No Result
View All Result

Google Enhances HTTPS Security by Compressing 15KB of Data into 700 Bytes”

in Technology
Reading Time: 1 min read
A A
0
Google Enhances HTTPS Security by Compressing 15KB of Data into 700 Bytes”
287
SHARES
1.6k
VIEWS
Share to XShare to LinkedinShare to Pinterest

Google Strengthens HTTPS Against Quantum Threats by Compressing 15kB of Data into 700 Bytes – Ars Technica

Google, along with other browser developers, mandates that all TLS certificates be recorded in public transparency logs, which function as distributed and append-only ledgers. This allows website owners to monitor these logs in real time to ensure that unauthorized certificates haven’t been issued for their domains. These transparency measures were introduced following the 2011 hacking incident involving DigiNotar, a Dutch company that led to the creation of 500 fake certificates for Google and other sites, some of which were exploited to surveil internet users in Iran.

If it becomes actionable, Shor’s algorithm could potentially replicate classical encryption signatures and compromise traditional encryption public keys seen in certificate logs. This could enable an adversary to fabricate signed certificate timestamps that indicate to a browser or operating system that a certificate is registered, even if it isn’t.

To prevent such scenarios, Google is incorporating cryptographic elements from quantum-resistant algorithms, particularly ML-DSA. This enhancement would mean that forgeries could only occur if both classical and post-quantum encryption were compromised. This initiative is part of Google’s quantum-resistant root store, which is intended to complement the Chrome Root Store established by the company in 2022.

The Merkle Tree Certificates (MTCs) utilize Merkle Trees to provide assurances against quantum threats regarding the publication of a certificate, without requiring the lengthy keys and hashes commonly associated with such processes. Westerbaan mentioned that through various methods to reduce data sizes, the MTCs will maintain an approximate length of 4kB.

This new framework has already been integrated into Chrome. Currently, Cloudflare is registering around 1,000 TLS certificates to evaluate the effectiveness of the MTCs. At present, Cloudflare is responsible for generating the distributed ledger; however, the intention is for Certificate Authorities to eventually take over that responsibility. Recently, the Internet Engineering Task Force established a working group named PKI, Logs, And Tree Signatures, to collaborate with other key stakeholders in formulating a long-term solution.

“We regard the adoption of MTCs and a quantum-resistant root store as a vital step in fortifying the core of today’s ecosystem,” stated Google in a recent blog post. “By catering to the unique requirements of a fast-evolving internet, we can expedite the adoption of post-quantum resilience for all web users.”

This post has been updated to clarify the reported sizes of various components.


Read the full article at the source

Tags: Technology
Tweet72Share20Pin26
TechVerdict

TechVerdict

Related Stories

Unlock Gemini’s Android App Superpowers: A Simple Guide

Unlock Gemini’s Android App Superpowers: A Simple Guide

by TechVerdict

Google Details 'AppFunctions': Unleashing Gemini's Power Within Your Android Apps Exciting news for Android developers! Following the recent buzz around Gemini automation, Google is now revealing the inner...

Best Gaming Headset for PC 2026: Ultimate Guide

Best Gaming Headset for PC 2026: Ultimate Guide

by TechVerdict

You’re probably shopping for a new headset for one of three reasons. Your current one sounds muddy in shooters, your mic turns every call into damage control, or...

WhatsApp Web Down: Users Face Login Issues on Meta-Owned Desktop Platform

“Users Report Login Troubles as WhatsApp Web Experiences Outage on Meta’s Desktop Service”

by TechVerdict

On the morning of February 27, several users in India faced difficulties logging into the desktop version of WhatsApp, which is owned by Meta. Many reported problems with...

Best TV for Bright Room: Top 2026 Picks & Glare Solutions

Best TV for Bright Room: Top 2026 Picks & Glare Solutions

by TechVerdict

Sunlight is brutal on TVs. A screen that looks rich and cinematic at night can turn gray, flat, and mirror-like by mid-afternoon. Dark scenes disappear first. Sports lose...

Next Post
Navigate the Web: Take Charge with Voice-Controlled AI Browsing

Navigate the Web: Take Charge with Voice-Controlled AI Browsing

Recommended

FBI recovers Nest Cam footage with out a subscription, elevating privateness issues

FBI recovers Nest Cam footage with out a subscription, elevating privateness issues

Astrill VPN Review

Astrill VPN Review: Is It Worth the Investment?

Popular Story

  • A blue phone sitting on top of a wooden table

    NordVPN Review: Secure Your Online Privacy with This Leading VPN

    294 shares
    Share 118 Tweet 74
  • Unlocking the Smart Speaker Secret: Simple Guide to Choosing the Right One (2026)

    293 shares
    Share 117 Tweet 73
  • ExpressVPN Review: Everything You Need to Know Before Signing Up

    293 shares
    Share 117 Tweet 73
  • Unlock Lyria 3: Simple Steps to Powerful Results

    291 shares
    Share 116 Tweet 73
  • NordVPN vs ExpressVPN: Which VPN is Better for You?

    290 shares
    Share 116 Tweet 73
The Lates Tech and AI News, Tests and Reviews | Tech Verdict

© 2026 | Techverdict

Navigation

  • About Us
  • Cookie Policy
  • Contact
  • Disclaimer
  • Privacy Policy

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Artificial Intelligence
    • ChatGPT
    • Claude ai
    • Gemini
    • Perplexity
  • Cybersecurity
    • Antivirus & Malware Protection
    • Identity & Data Protection
    • Network and Firewall Security
    • Password Managers
    • VPN
  • Review
    • VPN
  • Smart Home
    • Alexa
    • Google Home
    • Matter
  • Technology
    • Desktop
    • Laptop
    • Phones
    • Smartwatches

© 2026 | Techverdict