Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google’s Quantum-Resistant HTTPS Initiative in Chrome

Google’s Quantum-Resistant HTTPS Initiative in Chrome

Posted on March 2, 2026 By CWS

Google is spearheading a groundbreaking initiative to advance internet security by introducing quantum-resistant HTTPS in its Chrome browser. This effort aims to mitigate future risks posed by quantum computing capabilities.

The Chrome Secure Web and Networking Team announced that traditional X.509 certificates with post-quantum cryptography will not be immediately added to Chrome’s Root Store. Instead, they are working on a new type of HTTPS certificates called Merkle Tree Certificates (MTCs) in partnership with other industry leaders.

Understanding Merkle Tree Certificates

As Cloudflare describes, MTCs represent an evolution in Public Key Infrastructure (PKI), designed to streamline the TLS handshake process by minimizing public keys and signatures. In this model, a Certification Authority (CA) signs a ‘Tree Head’, which can encompass millions of certificates, and the browser receives a compact proof of inclusion.

This approach enables the integration of post-quantum algorithms without the extra bandwidth that classical X.509 certificate chains require. It separates the cryptographic security strength from the size of data transmitted, ensuring efficient browsing.

Phases of Implementation

Google is already testing MTCs with live internet traffic. The company plans a phased rollout, aiming to have full implementation by late 2027.

Currently, in Phase 1, Google is collaborating with Cloudflare to assess the performance and security of MTC-based TLS connections. During Phase 2, starting in early 2027, Certificate Transparency Log operators will join the initial setup of public MTCs.

Finally, by the third quarter of 2027, Phase 3 will establish the criteria for integrating additional CAs into the new Chrome Quantum-resistant Root Store, which will exclusively support MTCs.

Future-Proofing Web Security

Google views the adoption of MTCs and the development of a quantum-resistant root store as pivotal to strengthening the current internet security infrastructure. By designing systems that cater to the modern web’s needs, Google aims to expedite the adoption of post-quantum security measures for users worldwide.

This initiative underscores Google’s commitment to maintaining a secure and efficient internet, ensuring that as technology evolves, the web’s foundational security evolves with it.

The Hacker News Tags:Certification Authority, Chrome, Cybersecurity, Google, HTTPS, Merkle Tree Certificates, post-quantum cryptography, Public Key Infrastructure, quantum computing, TLS Handshake

Post navigation

Previous Post: Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser
Next Post: APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch

Related Posts

Enterprise Browsers vs. Secure Browser Extensions Enterprise Browsers vs. Secure Browser Extensions The Hacker News
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
dYdX Packages Breached: Wallet Theft and Malware Risks dYdX Packages Breached: Wallet Theft and Malware Risks The Hacker News
iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Enhances Ad Security with Gemini AI
  • Millions of FTP Servers Remain Unencrypted, Report Finds
  • Notion Public Pages Expose Editor Information
  • Vercel Confirms Intrusion After Hacker’s Data Sale Offer
  • ZionSiphon Malware Targets Israeli Water Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Enhances Ad Security with Gemini AI
  • Millions of FTP Servers Remain Unencrypted, Report Finds
  • Notion Public Pages Expose Editor Information
  • Vercel Confirms Intrusion After Hacker’s Data Sale Offer
  • ZionSiphon Malware Targets Israeli Water Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark