Google has begun integrating quantum-resistant encryption into Chrome’s HTTPS connections, a move intended to help protect web traffic against the anticipated threat of large-scale quantum computers. The effort centers on ML-KEM, a key-encapsulation mechanism that the National Institute of Standards and Technology finalized as a federal standard. If quantum machines eventually crack the encryption that secures online banking, email, and other sensitive traffic, this upgrade is meant to ensure that data harvested today cannot be decrypted tomorrow.
What ML-KEM Actually Does for HTTPS
Every time a browser establishes an HTTPS connection, it performs a key exchange with the server to create a shared secret that encrypts the session. Traditional key-exchange methods rely on mathematical problems that classical computers struggle to solve but that a sufficiently powerful quantum computer could significantly reduce the time and cost to break. ML-KEM replaces that vulnerable step with a lattice-based key-encapsulation mechanism, a class of math problems believed to resist both classical and quantum attacks. The practical effect for Chrome users is that their encrypted sessions gain a layer of protection against a future adversary armed with quantum hardware.
NIST published the standard as FIPS 203, formally titled Module-Lattice-Based Key-Encapsulation Mechanism Standard. The draft was obsoleted when the final version was released in August 2024, completing a multi-year evaluation process that began with the algorithm previously known as CRYSTALS-Kyber. The renaming to ML-KEM reflects its status as a fully standardized federal specification rather than a research candidate. By adopting this standard in Chrome, Google is aligning its browser with the federal government’s post-quantum standardization roadmap.
The “Harvest Now, Decrypt Later” Problem
The urgency behind this rollout is not driven by the existence of a working, large-scale quantum computer. No such machine is publicly known to exist. The real pressure comes from a well-documented intelligence strategy: adversaries can intercept and store encrypted traffic today, then decrypt it years from now once quantum hardware matures. Sensitive data with a long shelf life, such as medical records, diplomatic communications, financial transactions, and trade secrets, is especially vulnerable to this approach. Upgrading encryption before quantum computers arrive is one of the most effective ways to close that window.
This threat model explains why NIST accelerated its post-quantum cryptography program over the past several years. The agency’s goal was not to wait for a quantum emergency but to have vetted, interoperable standards ready for deployment well in advance. Chrome’s adoption of ML-KEM is a direct downstream result of that effort. Without browser-level implementation, even a perfect standard would remain an academic exercise for most internet users.
Compatibility Risks During the Transition
Switching encryption primitives across billions of devices and millions of servers is not seamless. ML-KEM key exchanges produce larger data payloads than their classical predecessors, which can cause problems for older network equipment, firewalls, and middleboxes that impose strict size limits on TLS handshake messages. Some enterprise environments running legacy hardware may see connection failures or degraded performance when Chrome attempts a post-quantum handshake with a server that supports it but sits behind infrastructure that does not.
Google has historically used a hybrid approach during such transitions, combining a classical key exchange with a post-quantum one so that the connection remains secure even if one layer is compromised. This strategy reduces the risk of a hard break for users on older networks, but it also increases handshake overhead. Organizations that manage their own TLS termination, particularly banks, hospitals, and government agencies, will need to audit their network stacks to ensure compatibility. The Information Technology Laboratory at NIST, which led the development of ML-KEM, is a key hub for the agency’s cryptography and security work, but the specifics of browser-to-server interoperability testing remain an open challenge for individual deployers.
What This Means for Other Browsers and the Wider Web
Chrome’s market share gives this decision outsized influence. When Google ships a protocol change in Chrome, server operators and content delivery networks tend to follow quickly because they cannot afford to break compatibility with the browser that handles the largest share of global web traffic. That dynamic means ML-KEM support on the server side is likely to accelerate once Chrome’s implementation reaches stable release channels. Other browser vendors face pressure to match the upgrade or risk being seen as less secure by comparison.
The broader consequence is a shift in the baseline expectation for web encryption. HTTPS was itself once an optional upgrade; now it is effectively mandatory for any serious website. Post-quantum key exchange appears to be on a similar trajectory. NIST’s cybersecurity workforce and education programs have emphasized the need for organizations to build internal capacity for cryptographic transitions, recognizing that the shift to post-quantum standards will require not just software updates but also trained personnel who understand the new algorithms and their operational requirements.
A Critique of the “Quantum-Proof” Framing
Calling any encryption scheme “quantum-proof” overstates what current science can guarantee. ML-KEM’s security rests on the assumed hardness of lattice problems for quantum computers, an assumption that has survived extensive academic scrutiny but has not been tested against an actual large-scale quantum machine. Cryptographers have broken algorithms before that were once considered safe, and the history of cryptography is littered with standards that aged poorly. The more accurate description is “quantum-resistant,” a term NIST itself uses, which signals strong confidence without claiming invulnerability.
That caveat does not diminish the practical value of the upgrade. Even if ML-KEM were eventually weakened by a new mathematical breakthrough, deploying it now raises the cost and complexity of any future attack. The alternative, doing nothing and leaving classical-only encryption in place, is demonstrably worse given the harvest-now-decrypt-later threat. Google’s decision to ship ML-KEM in Chrome is a calculated bet that the standard will hold, backed by years of public review and the weight of NIST’s evaluation process. For most users, the change will be invisible. For the long-term security of web traffic, it is one of the most consequential protocol shifts since the adoption of TLS 1.3.
More from Morning Overview
*This article was researched with the help of AI, with human editors creating the final content.