Proton Mail Adds Post-Quantum Encryption for New Emails to Counter Harvest-Now-Decrypt-Later Attacks

Proton Mail has added optional post-quantum encryption for new emails sent between Proton Mail accounts, protecting against harvest-now-decrypt-later (HNDL) attacks in which adversaries collect encrypted communications today with the intention of decrypting them when sufficiently powerful quantum computers become available. The feature uses the CRYSTALS-Kyber (ML-KEM) algorithm standardised by NIST in 2024. Existing encrypted emails are not retroactively re-encrypted.

4 min read
#post-quantum#cryptography#proton-mail#email-security#pqc#ml-kem#kyber#harvest-now-decrypt-later

Proton Mail has announced the availability of post-quantum encryption for emails sent between Proton Mail accounts, using the CRYSTALS-Kyber (formally standardised as ML-KEM under NIST FIPS 203 in 2024) algorithm for key encapsulation. The feature is available as an opt-in beta for Proton Mail users and is enabled on a per-account or per-conversation basis.

The implementation uses a hybrid approach: messages are encrypted with both a classical RSA or Elliptic Curve key exchange and a Kyber (ML-KEM) key encapsulation, providing protection against quantum-capable adversaries while maintaining compatibility with current infrastructure. An attacker would need to break both the classical and post-quantum encryption independently โ€” with the classical algorithm maintaining current security and Kyber providing quantum resistance.

Why Post-Quantum Email Encryption Matters Now

The common misconception about post-quantum cryptography is that it only matters when quantum computers that can break current encryption actually exist. This is incorrect for communications that need long-term confidentiality.

The harvest-now-decrypt-later (HNDL) threat model describes adversaries โ€” primarily nation-state intelligence agencies โ€” that collect and store encrypted communications today with the intention of decrypting them when cryptographically relevant quantum computers (CRQCs) become available. If a sufficiently powerful quantum computer capable of breaking RSA-2048 or ECC-256 keys is available in 10โ€“20 years, any communications encrypted today with these algorithms that were archived by an adversary become retroactively decryptable.

For communications requiring confidentiality over a multi-decade horizon โ€” classified government information, sensitive business negotiations, health records, legal proceedings โ€” HNDL is an active threat, not a theoretical future concern. Intelligence agencies known to operate large-scale communications interception programmes are assumed to be archiving encrypted traffic today.

Proton Mailโ€™s primary user base includes individuals and organisations with higher-than-average HNDL risk: journalists with confidential sources, whistleblowers, human rights advocates, legal professionals, and businesses with sensitive long-term commercial communications.

Technical Implementation

Proton Mailโ€™s implementation follows the hybrid encryption approach recommended by NIST and NSA:

  1. Classical key exchange: RSA-4096 or X25519 (depending on account key type) for the key exchange component โ€” maintaining current protection against classical cryptographic attacks
  2. ML-KEM-768 key encapsulation: NIST FIPS 203 ML-KEM (formerly Kyber-768) for the post-quantum key encapsulation, providing quantum resistance
  3. Combined session key: The classical and ML-KEM-derived key material is combined using HKDF to produce the AES-256 session key used to encrypt the message body
  4. AES-256-GCM: Message content encrypted with AES-256 in GCM mode โ€” unchanged from Protonโ€™s existing encryption

The hybrid approach means that breaking the encryption requires breaking both the classical RSA/ECC component (infeasible with current computers) AND the ML-KEM component (infeasible with a quantum computer) โ€” providing security against both current classical and future quantum attackers simultaneously.

Limitations

Opt-in: Post-quantum encryption is not enabled by default in the initial rollout. Users must enable it in account settings.

Proton-to-Proton only: The feature applies to emails between Proton Mail accounts. Emails sent to or received from non-Proton email addresses (Gmail, Outlook, etc.) use Protonโ€™s standard encryption for inbound and standard SMTP for outbound, without post-quantum protection โ€” reflecting the technical reality that non-Proton servers cannot participate in the ML-KEM key exchange.

No retroactive re-encryption: Existing encrypted emails stored in Proton accounts are not retroactively re-encrypted with post-quantum protection. Only new messages created after enabling the feature receive PQC protection.

Context: Industry Momentum

Protonโ€™s announcement follows similar moves by other providers. Signal enabled post-quantum key agreement (PQXDH) in 2023. Apple added PQ3 post-quantum encryption to iMessage in 2024. Google Cloudโ€™s internal infrastructure began migrating to hybrid post-quantum key exchange in 2023. The NSA has mandated PQC algorithm migration for national security systems by 2030.

The NIST PQC standardisation process โ€” which finalised ML-KEM, ML-DSA, and SLH-DSA in August 2024 โ€” provides the stable algorithmic foundation that deployment now requires. Organisations with data confidentiality requirements measured in decades should assess whether their current encryption posture accounts for the HNDL threat.

Share this article