Council Knowledge Base

Quantum-Resistant Security

Quantum computers threaten most encryption used today. D4TE was designed from the ground up to resist quantum attacks, using cryptographic algorithms that NIST has standardized for the post-quantum era.

The Quantum Threat Explained

Why Quantum Computers Are Different

Today's encryption relies on mathematical problems that classical computers can't efficiently solve—like finding the prime factors of very large numbers. A quantum computer using Shor's algorithm can solve these problems quickly, breaking RSA, Diffie-Hellman, and elliptic curve cryptography.

"Harvest Now, Decrypt Later"

Attackers don't need quantum computers today to threaten your data. They can:

  1. Capture your encrypted communications now (this is easy)
  2. Store them (storage is cheap)
  3. Decrypt them later when quantum computers exist

If your data needs to remain confidential for 5, 10, or 20+ years, quantum-resistant encryption matters today.

Timeline Considerations

Experts disagree on when quantum computers will break current encryption:

The prudent approach is to protect sensitive data now.

How D4TE Achieves Quantum Resistance

ML-KEM-768: The New Standard

D4TE uses ML-KEM-768 (formerly known as Kyber) for its post-quantum cryptography. This algorithm was:

ML-KEM's security is based on the hardness of lattice problems, which quantum computers cannot efficiently solve.

No Shor-Vulnerable Primitives

Unlike "hybrid" approaches that combine quantum-vulnerable and quantum-resistant algorithms, D4TE uses quantum-resistant primitives throughout:

Component Algorithm Quantum Security
Key encapsulation ML-KEM-768 ✓ NIST Level 3 (128-bit)
Symmetric encryption AES-256-GCM ✓ 128-bit (Grover's limit)
Key derivation HKDF-SHA256 ✓ 128-bit
Hashing SHA-512 ✓ 256-bit
Password hashing Argon2id ✓ Memory-hard

There are no elliptic curves, no RSA, no classical Diffie-Hellman.

The Spice Protocol

D4TE's Spice protocol uses ML-KEM-768 to distribute "cycle secrets" to network members. This provides an additional layer of quantum-resistant protection beyond the passphrase-derived keys:

Member A generates ML-KEM keypair
Member B encapsulates cycle secret
Member A decapsulates
Both share quantum-resistant secret

Comparing Quantum Readiness

Protocol Quantum Approach Status
D4TE Native ML-KEM All traffic protected
Signal PQXDH Hybrid (X25519 + ML-KEM) Initial key exchange only
WhatsApp No quantum protection Vulnerable to harvest-now attacks
iMessage PQ3 Hybrid Recent addition (2024)

Why "Hybrid" May Not Be Enough

Hybrid approaches combine classical and quantum-resistant algorithms. While this protects against quantum attacks, it means:

D4TE's native approach provides quantum resistance without these trade-offs.

Key Takeaways

  • Quantum computers will eventually break today's standard encryption
  • "Harvest now, decrypt later" makes this a present-day concern for long-lived data
  • D4TE uses NIST-standardized ML-KEM-768 with no quantum-vulnerable primitives
  • Council messages are protected against both current and future quantum attacks