Connect with us

Hi, what are you looking for?


Data Protection

Zoom Adding Post-Quantum End-to-End Encryption to Products

Zoom is announcing post-quantum end-to-end encryption on Meetings, with Phone and Rooms coming soon. 

Zoom post-quantum encryption

Video communications giant Zoom announced on Tuesday that post-quantum end-to-end encryption (E2EE) has been added to Zoom Workplace.

The feature, which leverages the Kyber 768 key encapsulation method, is currently available worldwide in Zoom Meetings, with Zoom Phone and Zoom Rooms coming soon. 

Zoom claims it is the first unified communications-as-a-service company to offer a post-quantum E2EE solution for video conferencing. 

“Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs,” said Michael Adams, CISO at Zoom. 

“With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected,” Adams added.

We may still be years away from practical quantum computing attacks, but major companies don’t want to be caught off guard and they have already started implementing post-quantum cryptography in their products. 

Apple recently announced adding post-quantum encryption to iMessage, and HP added quantum attack protection to the firmware of several business PCs. 

At the moment, the main concern for many companies is related to ‘Harvest Now, Decrypt Later’ attacks, where threat actors collect and store encrypted communications now with the goal of decrypting them in the future when quantum computers become available. 

Advertisement. Scroll to continue reading.

Related: Heartbleed is 10 Years Old – Farewell Heartbleed, Hello QuantumBleed!

Related: AI Helps Crack NIST-Recommended Post-Quantum Encryption Algorithm

Related: Tech Giants Form Post-Quantum Cryptography Alliance

Related: Quantum Decryption Brought Closer by Topological Qubits

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Retired U.S. Army General and former NSA Director Paul M. Nakasone has joined the Board of Directors at OpenAI.

Jill Passalacqua has been appointed Chief Legal Officer at autonomous security solutions provider

Cisco has appointed Sean Duca as CISO and Practice Leader for the APJC region.

More People On The Move

Expert Insights