Close Menu
geekfence.comgeekfence.com
    What's Hot

    Emerald Fennell’s Wuthering Heights Review

    February 14, 2026

    Infrastructure, Not Compute, is the Real AI Bottleneck

    February 14, 2026

    ALS stole this musician’s voice. AI let him sing again.

    February 14, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cloud Computing»New Google Cloud tool fights future quantum attacks
    Cloud Computing

    New Google Cloud tool fights future quantum attacks

    AdminBy AdminOctober 29, 2025No Comments3 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    New Google Cloud tool fights future quantum attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Google Cloud has added new post-quantum encryption options to its Key Management Service (Cloud KMS). The update is currently in preview and introduces support for post-quantum Key Encapsulation Mechanisms (KEMs) – a form of encryption built to resist attacks from cryptographically relevant quantum computers.

    Cloud KMS is a managed service that lets users create, use, rotate, and manage encryption keys for data and applications hosted on Google Cloud. It’s commonly used by organisations that rely on identity and access management (IAM) systems to protect sensitive data and meet compliance targets.

    The new feature is designed to address a threat known as “Harvest Now, Decrypt Later”. The theory is that malicious actors collect encrypted data today with the goal of decrypting it in the future when quantum computers become more available.

    Brent Muir, a principal consultant at Google Cloud, emphasised the urgency of early preparation. Writing on LinkedIn, he said: “It [is] crucial to protect sensitive data requiring long-term confidentiality, even if the quantum threat seems distant.”

    Transitioning from classical encryption systems like RSA to post-quantum KEMs brings new technical challenges. Unlike traditional methods, where the sender chooses and encrypts a shared key, a KEM generates the secret key during the encapsulation process. That means developers can’t swap out an existing encryption function, but will likely need to rework parts of their architecture.

    To ease the transition, Google recommends using Hybrid Public Key Encryption (HPKE), a standardised approach that supports both classical and post-quantum algorithms. HPKE is already available through Google’s open-source Tink library.

    Another challenge is size. Post-quantum keys and ciphertexts are much larger than their classical counterparts. For example, the ML-KEM-768 key is roughly 18 times the size of a P-256 key. The difference has the potential to affect performance for systems with tight limits on bandwidth, memory, or storage.

    Cloud KMS now supports several new options:

    • ML-KEM-768 and ML-KEM-1024 – implementations of the US National Institute of Standards and Technology’s (NIST) standardised Module-Lattice-based KEM (FIPS 203).
    • X-Wing (Hybrid KEM) – a dual-layer method that combines the classical X25519 algorithm with ML-KEM-768, designed for most general-purpose applications.

    Google Cloud plans to integrate post-quantum algorithms into its own infrastructure by 2026. The company’s open-source cryptographic libraries – BoringCrypto and Tink – already include the new implementations, with expanded HPKE support coming to Java, C++, Go, and Python later this year.

    Many organisations remain unprepared for quantum threats. In a blog post, Toyosi Kuteyi, a privacy and compliance specialist at Actalent, pointed out that awareness doesn’t necessarily mean readiness. “Only 9% of organisations have a post-quantum roadmap,” she wrote, citing data from Bain & Co. “Reports from PwC and Microsoft show most organisations are still ‘evaluating options.’ Many assume they’re not targets – creating a false sense of security.”

    According to Google, integrating new quantum-safe KEMs into existing security workflows is straightforward via the Cloud KMS API.

    (Photo by Manuel)

    See also: Google expands in Belgium and faces US AI antitrust scrutiny

    Want to learn more about Cloud Computing from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London. The comprehensive event is part of TechEx and co-located with other leading technology events. Click here for more information.

    CloudTech News is powered by TechForge Media. Explore other upcoming enterprise technology events and webinars here.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    AWS Weekly Roundup: Claude Opus 4.6 in Amazon Bedrock, AWS Builder ID Sign in with Apple, and more (February 9, 2026)

    February 14, 2026

    How to ensure your cloud data remains secure with CSPM

    February 13, 2026

    Go 1.26 unleashes performance-boosting Green Tea GC

    February 12, 2026

    Why Healthcare Still Isn’t Ready for AI

    February 11, 2026

    Threat Observability Updates in Secure Firewall 10.0

    February 10, 2026

    Amazon EC2 C8id, M8id, and R8id instances with up to 22.8 TB local NVMe storage are generally available

    February 8, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202617 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202512 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 20268 Views
    Don't Miss

    Emerald Fennell’s Wuthering Heights Review

    February 14, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor highlights six critical errors in Emerald Fennell’s…

    Infrastructure, Not Compute, is the Real AI Bottleneck

    February 14, 2026

    ALS stole this musician’s voice. AI let him sing again.

    February 14, 2026

    What is Prompt Chaining?

    February 14, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Emerald Fennell’s Wuthering Heights Review

    February 14, 2026

    Infrastructure, Not Compute, is the Real AI Bottleneck

    February 14, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.