Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Fans React To The New Star Fox

    May 7, 2026

    Final Fantasy 9 Official New Release Drops On May 16

    May 7, 2026

    We Built Our Perfect BMW iX3 and Kept It Under $72,000

    May 7, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Why Signal’s post-quantum makeover is an amazing engineering achievement
    Why Signal’s post-quantum makeover is an amazing engineering achievement
    Tech Reviews

    Why Signal’s post-quantum makeover is an amazing engineering achievement

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 28, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Even though the ping-ponging keys are vulnerable to future quantum attacks, they are broadly believed to be secure against today’s attacks from classical computers. The Signal Protocol developers didn’t want to remove them or the battle-tested code that produces them. That led to their decision to add quantum resistance by adding a third ratchet. This one uses a quantum-safe KEM to produce new secrets much like the Diffie-Hellman ratchet did before, ensuring quantum-safe, post-compromise security.

    The technical challenges were anything but easy. Elliptic curve keys generated in the X25519 implementation are about 32 bytes long, small enough to be added to each message without creating a burden on already constrained bandwidths or computing resources. A ML-KEM 768 key, by contrast, is 1,000 bytes. Additionally, Signal’s design requires sending both an encryption key and a ciphertext, making the total size 2,272 bytes.

    Table of Contents

    Toggle
    • And then there were three
      • Related posts:
    • A Far-Reaching Aurora Is Coming Tuesday and Wednesday Night: Here's Where You May See It
    • Star Wars Guide: How to Watch Movies, TV Shows and Side Stories in Order
    • World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    And then there were three

    To handle the 71x increase, Signal developers considered a variety of options. One was to send the 2,272-byte KEM key less often—say every 50th message or once every week—rather than every message. That idea was nixed because it doesn’t work well in asynchronous or adversarial messaging environments. Signal Protocol developers Graeme Connell and Rolfe Schmidt explained:

    Consider the case of “send a key if you haven’t sent one in a week”. If Bob has been offline for 2 weeks, what does Alice do when she wants to send a message? What happens if we can lose messages, and we lose the one in fifty that contains a new key? Or, what happens if there’s an attacker in the middle that wants to stop us from generating new secrets, and can look for messages that are [many] bytes larger than the others and drop them, only allowing keyless messages through?

    Another option Signal engineers considered was breaking the 2,272-byte key into smaller chunks, say 71 of them that are 32 bytes each. Breaking up the KEM key into smaller chunks and putting one in each message sounds like a viable approach at first, but once again, the asynchronous environment of messaging made it unworkable. What happens, for example, when data loss causes one of the chunks to be dropped? The protocol could deal with this scenario by just repeat-sending chunks again after sending all 71 previously. But then an adversary monitoring the traffic could simply cause packet 3 to be dropped each time, preventing Alice and Bob from completing the key exchange.

    Related posts:

    12+ compact accessories that'll turn your phone into the perfect video and photo tool for travel — f...

    Amazfit Helio Strap vs Polar Loop vs Whoop 5.0: Which should you buy?

    Best Wi-Fi Access Points: 2026's Top Five

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleLightricks nya AI-videomodell LTX-2 utmanar jättarna
    Next Article Agentic AI Coding with Google Jules
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Ars Asks: Share your shell and show us your tricked-out terminals!

    May 7, 2026
    Tech Reviews

    A Star Fox Remake Is Heading To Switch 2 On June 25

    May 6, 2026
    Tech Reviews

    World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    May 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202569 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202569 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.