Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to significant connection issues for some users. This new feature, the X25519Kyber768 encapsulation mechanism, is designed to enhance security against potential future quantum cryptanalysis but has inadvertently disrupted TLS (Transport Layer Security) connections for numerous websites, servers, and firewalls.

Google had been testing this post-quantum secure TLS key encapsulation mechanism since August and decided to enable it by default in the latest Chrome release. The update aims to protect users from “store now, decrypt later” attacks, where attackers store encrypted data to decrypt it later with more advanced technology, potentially including quantum computers.

However, this update has led to compatibility issues across the web. System administrators have reported that since the release of Chrome 124 and Microsoft Edge 124, some web applications, firewalls, and servers have been dropping connections during the ClientHello TLS handshake. This problem stems from servers not recognizing the additional data in the ClientHello message used for post-quantum cryptography, leading them to reject connections that use the Kyber768 quantum-resistant key agreement algorithm.

These issues have affected various network devices from multiple vendors, including Fortinet, SonicWall, Palo Alto Networks, and AWS, indicating a widespread impact across different platforms. As a result, a website called tldr.fail has been created to help developers understand how large post-quantum ClientHello messages can break connections and provide guidance on how to address these issues.

For users experiencing connection resets, Google has provided a temporary fix. Affected users can disable the TLS 1.3 hybridized Kyber support in Chrome by navigating to `chrome://flags/#enable-tls13-kyber`. Administrators can also disable this feature by toggling off the PostQuantumKeyAgreementEnabled enterprise policy under their software policies for Google Chrome or by contacting vendors for updates to make servers or middleboxes post-quantum-ready.

Despite these challenges, the move towards post-quantum cryptography is seen as crucial for future-proofing internet security against emerging threats. Google has indicated that the option to disable post-quantum secure ciphers will be removed in future Chrome versions, highlighting the importance of transitioning to these new security standards.

 

Top Stories

Related Articles

May 11, 2026 Bank 777 bestaan men van gij snelst uitbetalende online casino’su, want dit goksite rechtstreeks uitbetaalt. Het uitbetalin worden more...

May 11, 2026 Tenemos un número particular de amabilidad alrededor del cliente de TopX de usuarios acerca de España. Probá demás more...

May 11, 2026 Ga akelig u inlogpagina, veevoer jij gebruikersnaam en sterk wachtwoord om. Zorg pro deze de websiteverbinding beveiligd bestaan more...

May 11, 2026 Tomarte el lapso con el fin de investigar y cotejar serí­a indispensable para encontrar una oferta que conveniente more...

Jim Love

Jim Is and author and pud cast host with over 40 years in technology.