+91 – 7838219999


HomenewsroomProduct UpdatesZoom Bolsters Security with Post-Quantum End-to-End Encryption for Zoom Workplace

Zoom Bolsters Security with Post-Quantum End-to-End Encryption for Zoom Workplace

Sunday, June 16, 2024

Zoom Video Communications, Inc. has taken a significant leap in enhancing its security framework by announcing the global availability of post-quantum end-to-end encryption (E2EE) for Zoom Workplace, specifically for Zoom Meetings. This advancement positions Zoom as the first Unified Communications as a Service (UCaaS) provider to integrate post-quantum E2EE into its video conferencing services. Additionally, Zoom has plans to extend this security feature to Zoom Phone and Zoom Rooms in the near future.

Addressing Future Security Threats

As technological advancements accelerate, so do the capabilities of cyber adversaries. One of the emerging threats in cybersecurity is the potential for quantum computers to decrypt currently secure encrypted data. This threat, often referred to as “harvest now, decrypt later,” involves the capture of encrypted data today with the intention of decrypting it once quantum computing reaches maturity

While practical quantum computers capable of such decryption are not yet available, Zoom is proactively addressing this potential threat. By incorporating algorithms resilient to quantum attacks, Zoom ensures that user data remains secure both now and in the future. This proactive approach underscores Zoom’s commitment to staying ahead of the evolving security landscape.

The Evolution of Encryption for Zoom

Since the introduction of end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, user adoption of these features has highlighted the growing importance of robust security measures. Michael Adams, Zoom’s Chief Information Security Officer, remarked, “With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.”

How Post-Quantum E2EE Works

Zoom’s implementation of post-quantum E2EE ensures that only meeting participants have access to the encryption keys needed to decrypt the meeting data. This design principle holds true for both post-quantum E2EE and standard E2EE. Crucially, Zoom’s servers do not have access to these decryption keys, meaning any data relayed through these servers remains encrypted and secure from interception.

To combat the “harvest now, decrypt later” threat, Zoom’s post-quantum E2EE employs Kyber 768. This algorithm, being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism (ML-KEM) in FIPS 203, is designed to withstand the computational power of future quantum computers.

A Proactive Stance on Security

Zoom’s introduction of post-quantum E2EE is a testament to its commitment to safeguarding user data against both current and future threats. By pioneering the integration of post-quantum encryption into its UCaaS platform, Zoom not only enhances the security of its services but also sets a new standard for the industry.

As the cybersecurity landscape continues to evolve, users can rely on Zoom’s innovative and proactive measures to ensure their communications remain secure. This latest enhancement reaffirms Zoom’s dedication to providing a secure and reliable platform, meeting the complex and changing needs of its global user base.