Proton Mail has announced the availability of post-quantum encryption for emails sent between Proton Mail accounts, using the CRYSTALS-Kyber (formally standardised as ML-KEM under NIST FIPS 203 in 2024) algorithm for key encapsulation. The feature is available as an opt-in beta for Proton Mail users and is enabled on a per-account or per-conversation basis.
The implementation uses a hybrid approach: messages are encrypted with both a classical RSA or Elliptic Curve key exchange and a Kyber (ML-KEM) key encapsulation, providing protection against quantum-capable adversaries while maintaining compatibility with current infrastructure. An attacker would need to break both the classical and post-quantum encryption independently โ with the classical algorithm maintaining current security and Kyber providing quantum resistance.
Why Post-Quantum Email Encryption Matters Now
The common misconception about post-quantum cryptography is that it only matters when quantum computers that can break current encryption actually exist. This is incorrect for communications that need long-term confidentiality.
The harvest-now-decrypt-later (HNDL) threat model describes adversaries โ primarily nation-state intelligence agencies โ that collect and store encrypted communications today with the intention of decrypting them when cryptographically relevant quantum computers (CRQCs) become available. If a sufficiently powerful quantum computer capable of breaking RSA-2048 or ECC-256 keys is available in 10โ20 years, any communications encrypted today with these algorithms that were archived by an adversary become retroactively decryptable.
For communications requiring confidentiality over a multi-decade horizon โ classified government information, sensitive business negotiations, health records, legal proceedings โ HNDL is an active threat, not a theoretical future concern. Intelligence agencies known to operate large-scale communications interception programmes are assumed to be archiving encrypted traffic today.
Proton Mailโs primary user base includes individuals and organisations with higher-than-average HNDL risk: journalists with confidential sources, whistleblowers, human rights advocates, legal professionals, and businesses with sensitive long-term commercial communications.
Technical Implementation
Proton Mailโs implementation follows the hybrid encryption approach recommended by NIST and NSA:
- Classical key exchange: RSA-4096 or X25519 (depending on account key type) for the key exchange component โ maintaining current protection against classical cryptographic attacks
- ML-KEM-768 key encapsulation: NIST FIPS 203 ML-KEM (formerly Kyber-768) for the post-quantum key encapsulation, providing quantum resistance
- Combined session key: The classical and ML-KEM-derived key material is combined using HKDF to produce the AES-256 session key used to encrypt the message body
- AES-256-GCM: Message content encrypted with AES-256 in GCM mode โ unchanged from Protonโs existing encryption
The hybrid approach means that breaking the encryption requires breaking both the classical RSA/ECC component (infeasible with current computers) AND the ML-KEM component (infeasible with a quantum computer) โ providing security against both current classical and future quantum attackers simultaneously.
Limitations
Opt-in: Post-quantum encryption is not enabled by default in the initial rollout. Users must enable it in account settings.
Proton-to-Proton only: The feature applies to emails between Proton Mail accounts. Emails sent to or received from non-Proton email addresses (Gmail, Outlook, etc.) use Protonโs standard encryption for inbound and standard SMTP for outbound, without post-quantum protection โ reflecting the technical reality that non-Proton servers cannot participate in the ML-KEM key exchange.
No retroactive re-encryption: Existing encrypted emails stored in Proton accounts are not retroactively re-encrypted with post-quantum protection. Only new messages created after enabling the feature receive PQC protection.
Context: Industry Momentum
Protonโs announcement follows similar moves by other providers. Signal enabled post-quantum key agreement (PQXDH) in 2023. Apple added PQ3 post-quantum encryption to iMessage in 2024. Google Cloudโs internal infrastructure began migrating to hybrid post-quantum key exchange in 2023. The NSA has mandated PQC algorithm migration for national security systems by 2030.
The NIST PQC standardisation process โ which finalised ML-KEM, ML-DSA, and SLH-DSA in August 2024 โ provides the stable algorithmic foundation that deployment now requires. Organisations with data confidentiality requirements measured in decades should assess whether their current encryption posture accounts for the HNDL threat.
Share this article