Wednesday, December 11, 2024
spot_img
More
    HomeLatest NewsZoom Security Upgrade Explained: What is Post-Quantum Encryption?

    Zoom Security Upgrade Explained: What is Post-Quantum Encryption?

    Zoom Video Communications announced that Zoom Workplace—specifically, Meetings—now offers post-quantum end-to-end encryption (E2EE) on a worldwide scale. Zoom Phone and Rooms will follow shortly. With the release of the new security feature, the video communications company is now the first UCaaS provider to provide a post-quantum E2EE video conferencing service.

    Also read: How Quantum Computing is Revolutionizing the Future

    The company aims to offer a single platform that facilitates infinite human communication. With the help of third-party apps and integrations, Zoom Workplace—our AI-powered, open collaboration platform designed for modern work—optimizes in-person time, boosts employee engagement, expedites communications, and gives customers choices. Meetings, team chat, phone, scheduler, whiteboard, places, Workvivo, and other collaboration tools are all included in Zoom Workplace, which AI Companion powers.

    Zoom’s Business Services for sales, marketing, and customer support teams, including Zoom Contact Centre, enhance customer relationships throughout the customer lifecycle in tandem with Zoom Workplace. NASDAQ: ZM is Zoom’s public trading symbol. It was founded in 2011 and has its headquarters in San Jose, California.

    Zoom has Upgraded its Algorithms in Anticipation of Future Threats

    Protecting user data becomes more important as hostile threats become more advanced. The phrase “harvest now, decrypt later” refers to the possibility that hackers could be able to intercept encrypted network communication under particular conditions to decrypt it later on as quantum computers improve. Although no solid quantum computers have these capabilities, Zoom has upgraded its algorithms in anticipation of future threats.

    Zoom’s chief information security officer, Michael Adams, stated, “Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs.” With the release of post-quantum E2EE, we are putting even more emphasis on security and offering cutting-edge tools to consumers to safeguard their data better. Zoom constantly adapts to keep our consumers safe as the security threat landscape changes.

    Operation of Post-quantum E2E Encryption

    Zoom’s system restricts access to the encryption keys used to encrypt meetings to the participants alone when users enable E2EE for their meetings; this is the case for both post-quantum and conventional E2EE. Encrypted data relayed through Zoom’s servers cannot be decrypted because Zoom’s servers lack the required decryption key. Additionally, Zoom’s post-quantum E2E encryption employs Kyber 768, a method that is being standardised by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism, or ML-KEM, in FIPS 203, to thwart “harvest now, decrypt later” assaults.

    Author

    RELATED ARTICLES

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here

    Most Popular

    spot_img
    spot_img