Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Introduces MTCs to Secure HTTPS from Quantum Risks

Google Introduces MTCs to Secure HTTPS from Quantum Risks

Posted on March 3, 2026 By CWS

Google has unveiled a strategic move to safeguard HTTPS connections against the potential dangers posed by advancements in quantum computing. This initiative is part of a collaborative effort with the Internet Engineering Task Force (IETF) and its PLANTS working group, focusing on the transition to Merkle Tree Certificates (MTCs).

Understanding Merkle Tree Certificates

The shift to MTCs aims to address the performance and bandwidth challenges that traditional quantum-resistant cryptographic methods would introduce to TLS connections. Rather than incorporating post-quantum cryptography into the traditional X.509 certificates within the Chrome Root Store, Google is prioritizing MTCs for a more streamlined and effective solution for web encryption.

Traditional X.509 certificate chains demand substantial bandwidth, which would only increase with the integration of robust post-quantum algorithms. MTCs overcome this by replacing the extensive signature chains with concise Merkle Tree proofs. Certification Authorities (CAs) will sign a single ‘Tree Head,’ representing potentially vast numbers of certificates, while browsers receive a lightweight proof of inclusion within that tree, ensuring a fast and efficient post-quantum web.

Advantages of MTCs

One of the core benefits of MTCs is the fundamental requirement for transparency, making it impossible to issue an MTC without public tree inclusion. This effectively embeds the security properties of the current Certificate Transparency ecosystem without adding extra overhead to the TLS handshake. MTCs thus offer a more scalable approach to maintaining the security and efficiency of web connections.

Additionally, this transition enables a modernization of the TLS foundation, focusing on simplicity, transparency, and resilience. Key innovations include adopting ACME-only workflows for cryptographic agility and replacing outdated CRLs with advanced revocation-status communication. The CA inclusion model will also evolve, emphasizing proven operational excellence.

Chrome’s Phased Rollout Approach

Google Chrome has outlined a structured plan for implementing MTCs across the internet. The strategy involves three phases: a feasibility study currently underway in collaboration with Cloudflare, followed by CT Log operators’ bootstrapping of public MTCs by Q1 2027, and culminating in the launch of the Chrome Quantum-resistant Root Store (CQRS) by Q3 2027. This rollout will support MTCs alongside the existing Root Program, with optional quantum-only certificates.

As Google advances this quantum-resistant initiative, it remains committed to supporting its current CA partners and the existing Chrome Root Program. A detailed policy framework for the new quantum-resistant root store will be made available to the community as the project develops.

Stay updated with the latest in cybersecurity by following us on Google News, LinkedIn, and X. For more information or to feature your stories, contact us.

Cyber Security News Tags:Certificate Transparency, Chrome, Cloudflare, Cryptography, Cybersecurity, Encryption, Google, HTTPS, IETF, internet security, Merkle Tree Certificates, Public Key Infrastructure, quantum computing, TLS, web security

Post navigation

Previous Post: University of Hawaii Data Breach Affects 1.2 Million
Next Post: Fake IT Support Scam Spreads Havoc C2 Framework

Related Posts

Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data Hundreds of Free VPN Apps for Both Android and iOS Leaks Users Personal Data Cyber Security News
Hackers Stole Customer Data from Salesforce Instances Hackers Stole Customer Data from Salesforce Instances Cyber Security News
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code Cyber Security News
Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Hackers Allegedly Claim Breach of Scania Financial Services, Sensitive Data Stolen Cyber Security News
New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System New 7-Zip Vulnerability Enables Malicious RAR5 File to Crash Your System Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News