DEV Community

ArshTechPro
ArshTechPro

Posted on

WWDC 2025 - Quantum-secure cryptography

Quantum computing poses an imminent threat to the cryptographic foundations that protect our applications and user data. While sufficiently powerful quantum computers don't exist yet, the time to act is now. Here's what developers need to know about transitioning to quantum-secure cryptography.

The Quantum Threat is Real and Present

The most pressing concern is the "harvest now, decrypt later" attack. Attackers can currently intercept and store encrypted network traffic, then decrypt it once quantum computers become available. This means sensitive data transmitted today could be compromised in the future.

Quantum attacks affect cryptography in two main ways:

  • Public-key cryptography (RSA, elliptic curves) will be completely broken by quantum computers
  • Symmetric-key cryptography will be weakened but can be strengthened by doubling key sizes (e.g., AES-128 to AES-256)

Apple's Quantum-Secure Solutions

Network Protection with TLS

Starting in iOS 26, quantum-secure encryption in TLS is enabled by default for URLSession and Network.framework. This protects against harvest-now-decrypt-later attacks for most network traffic.

To implement:

  • Use recommended networking APIs (URLSession, Network.framework)
  • Migrate away from legacy APIs like Secure Transport
  • Enable quantum-secure TLS on your servers (many hosting providers already support this)

Custom Protocols with CryptoKit

For applications requiring custom cryptography, iOS 26 introduces new quantum-secure APIs in CryptoKit:

  • Post-quantum HPKE for encryption (using X-Wing KEM)
  • Post-quantum Hybrid Signatures for authentication
  • ML-KEM and ML-DSA for low-level protocol implementation

These APIs offer:

  • Hardware-isolated execution with Secure Enclave
  • Formally verified implementations
  • Server compatibility through Swift Crypto

Implementation Strategy

  1. Prioritize network data protection - Enable quantum-secure TLS first
  2. Inventory current cryptography usage - Identify quantum-vulnerable protocols
  3. Plan migration path - Update protocols to use quantum-secure alternatives
  4. Use hybrid approaches - Combine post-quantum algorithms with classical ones for maximum security

Apple Leading by Example

Apple has already implemented quantum-secure cryptography in:

  • iMessage PQ3 (iOS 17.4) - quantum-secure messaging at scale
  • System services (CloudKit, Push Notifications, Private Relay)
  • Built-in apps (Safari, Weather, Maps)

The quantum threat isn't a distant possibility—it's a present reality that requires immediate action. By adopting quantum-secure cryptography today, developers can protect their users' sensitive data from both current and future quantum attacks.

Top comments (0)