Zoom strengthens its security offering by integrating post-quantum end-to-end encryption into Zoom Workplace

Zoom strengthens its security offering by integrating post-quantum end-to-end encryption into Zoom Workplace
Zoom strengthens its security offering by integrating post-quantum end-to-end encryption into Zoom Workplace

Zoom strengthens its security offering by integrating post-quantum end-to-end encryption into Zoom Workplace

Zoom Video Communications, Inc. announces that post-quantum end-to-end encryption (E2EE) is now available globally for Zoom Workplace, specifically Zoom Meetings, and will soon be extended to Zoom Phone and Zoom Rooms. The launch of this security enhancement makes Zoom one of the first UCaaS companies to offer a post-quantum E2EE solution for video conferencing.

Post-quantum encryption is designed to protect against harvest now, decrypt later attacks. These are launched by attackers with the ability to capture and store encrypted network traffic, with the intention of decrypting it when quantum computers are more advanced. Zoom has proactively integrated algorithms designed to be able to resist these potential future threats.

When users enable E2EE for their meetings, Zoom’s system is designed so that only participants have access to the encryption keys used. This operation applies to both post-quantum E2EE and standard E2EE. Since Zoom’s servers do not have the necessary decryption key, the encrypted data relayed by Zoom’s servers is indecipherable. To provide defense against harvest now, decrypt later attacks, Zoom’s post-quantum E2EE relies on Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as Lattice-based Key Encapsulation Mechanism Module, or ML-KEM, in the FIPS 203 standard.

-

-

PREV this stereo hi-fi amplifier sees its price drop to the lowest at Son-Vidéo.com
NEXT Good deal – The Netatmo connected object Connected thermostatic heads for radiators Additional “5-star” valve at €59.99 (-22%)