Zoom Enhances Security with Global Launch of Post-Quantum End-to-End Encryption

More From Author

See more articles

Chainsaw Man Season 2: Everything We Know – Release...

Chainsaw Man Season 2 Everything We Know: The anime world exploded when Chainsaw Man debuted in 2022,...

Housefull 5 Box Office Collection Day 1: Gets ₹23...

Housefull 5 Box Office Collection: Akshay Kumar's highly anticipated comedy sequel Housefull 5 has made a spectacular...

Gachiakuta Anime July 6, 2025: World Takeover Campaign, Global...

The anime world is buzzing with excitement as Gachiakuta anime gears up for its global streaming debut...

Zoom Video Communications, Inc. (NASDAQ: ZM) has announced the global availability of post-quantum end-to-end encryption (E2EE) for Zoom Workplace, particularly for Zoom Meetings. This groundbreaking security feature will soon extend to Zoom Phone and Zoom Rooms, making Zoom the first UCaaS company to offer a post-quantum E2EE solution for video conferencing.

Zoom bolsters security offering with the inclusion of post-quantum end-to-end encryption in Zoom Workplace

Addressing Advanced Security Threats

As cyber threats become increasingly sophisticated, the need to safeguard user data has never been more critical. Attackers may capture encrypted network traffic today with the intention to decrypt it later when quantum computers become more advanced—a scenario known as “harvest now, decrypt later.” Anticipating this future threat, Zoom has proactively upgraded its encryption algorithms to withstand potential quantum computing attacks.

Michael Adams, Chief Information Security Officer at Zoom, emphasized the importance of this enhancement:

“Since we launched end-to-end encryption for Zoom Meetings in 2020 and Zoom Phone in 2022, we have seen customers increasingly use the feature, which demonstrates how important it is for us to offer our customers a secure platform that meets their unique needs. With the launch of post-quantum E2EE, we are doubling down on security and providing leading-edge features for users to help protect their data. At Zoom, we continuously adapt as the security threat landscape evolves, with the goal of keeping our users protected.”

How Post-Quantum E2EE Works

When users enable E2EE for their meetings, Zoom’s system ensures that only participants have access to the encryption keys needed to decrypt the data. Zoom’s servers do not hold these keys, making any relayed encrypted data indecipherable. To defend against “harvest now, decrypt later” attacks, Zoom’s post-quantum E2EE employs Kyber 768, an algorithm being standardized by the National Institute of Standards and Technology (NIST) as the Module Lattice-based Key Encapsulation Mechanism (ML-KEM) in FIPS 203.

Benefits of Post-Quantum E2EE

  • Enhanced Security: Guards against future quantum computing threats.
  • User Control: Only meeting participants can access decryption keys.
  • Innovative Algorithms: Utilizes Kyber 768, a leading-edge encryption standard.

Availability and Support

Post-quantum E2EE is currently available for Zoom Meetings in Zoom Workplace, with support for Zoom Phone and Zoom Rooms coming soon. For more details on supported versions and platforms, visit our support article.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

━ Related News

Featured

━ Latest News

Featured